Cheung, L. and Newport, C. (2007). Provably secure ci-
phertext policy abe. In Proc. of ACM Conference on
Computer and Communications Security 2007, pages
456–465.
Emura, K., Miyaji, A., Nomura, A., Omote, K., and Soshi,
M. (2009). A ciphertext-policy attribute-based en-
cryption scheme with constant ciphertext length. In
Proc. of ISPEC’09, pages 13–23.
ETSI. TS 102 796: Hybrid Broadcast Broadband TV;
V1.3.1.
Gay, R., Meaux, P., and Wee, H. (2015). Predicate encryp-
tion for multi-dimensional range queries from lattices.
In Proc. of PKC’15, pages 752–776.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proc. of ACM Con-
ference on Computer and Communications Security
2006, pages 89–98.
Green, M., Hohenberger, S., and Waters, B. (2011). Out-
sourcing the decryption of abe ciphertexts. In Proc. of
USENIX Security Symposium 2011.
Hohenberger, S. and Waters, B. (2014). Online/offline
attribute-based encryption. In Proc. of PKC’14, pages
293–310.
Katz, J., Sahai, A., and Waters, B. (2008). Predicate encryp-
tion supporting disjunctions, polynomial equations,
and inner products. In Proc. of Eurocrypt’08, pages
146–162.
KBS. icon (in Korean). http://icon.kbs.co.kr/site/main/
main.php.
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., and
Waters, B. (2010). Fully secure functional encryp-
tion: Attribute-based encryption and (hierarchical) in-
ner product encryption. In Proc. of Eurocrypt’10,
pages 62–91.
Li, J., Huang, X., Li, J., Chen, X., and Xiang, Y. (2014).
Securely outsourcing attribute-based encryption with
checkability. IEEE Trans. Parallel and Distributed
Systems, 25(8):2201–2210.
Li, J., Jia, C., Li, J., and Chen, X. (2012). Outsourcing
encryption of attribute-based encryption with mapre-
duce. In Proc. of ICICS’12, pages 191–201.
NHK. Hybridcast (in Japanese). http://www.nhk.or.jp/
hybridcast/online/.
Nishide, T., Yoneyama, K., and Ohta, K. (2008). Attribute-
based encryption with partially hidden encryptor-
specified access structures. In Proc. of ACNS’08,
pages 111–129.
Ohmata, H., Endo, H., Baba, A., Matsumura, K., Sunasaki,
S., and Kai, K. (2015). System architecture for cross-
channel application services on hybridcast. In Proc.
of IEEE International Conference on Consumer Elec-
tronics 2015 (ICCE 2015), pages 108–109.
Ohmata, H., Takechi, M., Mitsuya, S., Otsuki, K., Baba, A.,
Matsumura, K., Majima, K., and Sunasaki, S. (2013).
Hybridcast: A new media experience by integration
of broadcasting and broadband. In Proc. of the ITU
Kaleidoscope Academic Conference 2013.
Ohtake, G., Hironaka, Y., Kai, K., Endo, Y., Hanaoka,
G., Watanabe, H., Yamada, S., Kasamatsu, K., Ya-
makawa, T., and Imai, H. (2013). Partially wildcarded
attribute-based encryption and its efficient construc-
tion. In Proc. of SECRYPT’13, pages 339–346.
Okamoto, T. and Takashima, K. (2010). Fully secure func-
tional encryption with general relations from the deci-
sional linear assumption. In Proc. of Crypto’10, pages
191–208.
Ostrovsky, R., Sahai, A., and Waters, B. (2007). Attribute-
based encryption with non-monotonic access struc-
tures. In Proc. of ACM Conference on Computer and
Communications Security 2007, pages 195–203.
Rouselakis, Y. and Waters, B. (2013). Practical con-
structions and new proof methods for large universe
attribute-based encryption. In Proc. of ACMCCS’13,
pages 463–474.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based en-
cryption. In Proc. of Eurocrypt’05, pages 457–473.
Shamir, A. (1979). How to share a secret. Communications
of the ACM, 22:612–613.
Waters, B. (2008). Ciphertext-policy attribute-based en-
cryption: An expressive, efficient, and provably se-
cure realization. In eprint 2008/290.
Zhou, Z. and Huang, D. (2011). Efficient and secure data
storage operations for mobile cloud computing. In
eprint 2011/185.