the feasibility of attribute-based encryption on internet
of things devices." IEEE Micro 36(6), 25-35.
Bethencourt, J., A. Sahai and B. Waters. 2007 "Ciphertext-
policy attribute-based encryption". IEEE Symposium on
Security and Privacy, IEEE.321-334
Cheung, L. and C. Newport. 2007 "Provably secure
ciphertext policy ABE". Proceedings of the 14th ACM
conference on Computer and communications security,
ACM.456-465
Delerablée, C. 2007 "Identity-based broadcast encryption
with constant size ciphertexts and private keys".
International Conference on the Theory and
Application of Cryptology and Information Security,
Springer.200-215
Emura, K., A. Miyaji, A. Nomura, K. Omote and M. Soshi.
2009 "A Ciphertext-Policy Attribute-Based Encryption
Scheme with Constant Ciphertext Length". ISPEC,
Springer.13-23
Guo, F., Y. Mu and W. Susilo. 2012 "Identity-Based Traitor
Tracing with Short Private Key and Short Ciphertext".
ESORICS, Springer.609-626
Guo, F., Y. Mu, W. Susilo, D. S. Wong and V.
Varadharajan. 2014 "CP-ABE with constant-size keys
for lightweight devices." IEEE Transactions on
Information Forensics and Security 9(5), 763-771.
Guo, H., C. Xu, Z. Li, Y. Yao and Y. Mu. 2013 "Efficient
and dynamic key management for multiple identities in
identity-based systems." Information Sciences 221,
579-590.
Herranz, J., F. Laguillaumie and C. Ràfols. 2010 "Constant
size ciphertexts in threshold attribute-based
encryption". International Workshop on Public Key
Cryptography, Springer.19-34
Katagi, M. and S. Moriai. 2008 "Lightweight cryptography
for the internet of things." Sony Corporation, 7-10.
Li, H., X. Lin, H. Yang, X. Liang, R. Lu and X. Shen. 2014
"EPPDR: an efficient privacy-preserving demand
response scheme with adaptive key evolution in smart
grid." IEEE Transactions on Parallel and Distributed
Systems 25(8), 2053-2064.
Liew, S.-C., Liew, S.-W., Zain, J.M. 2013. "Tamper
localization and lossless recovery watermarking
scheme with roi segmentation and multilevel
authentication". Journal of Digital Imaging, 26 (2), pp.
316-325.
Odelu, V., A. K. Das, M. K. Khan, K.-K. R. Choo and M.
Jo. 2017 "Expressive CP-ABE scheme for mobile
devices in IoT satisfying constant-size Keys and
ciphertexts." IEEE Access 5, 3273-3283.
Sahai, A. and B. Waters. 2005 "Fuzzy identity-based
encryption". Annual International Conference on the
Theory and Applications of Cryptographic Techniques,
Springer.457-473
Vaanchig, N., W. Chen and Z. Qin. 2016 "Ciphertext-
Policy Attribute-Based Access Control with Effective
User Revocation for Cloud Data Sharing System".
International Conference on Advanced Cloud and Big
Data (CBD), IEEE.186-193
Yang, Y., H. Cai, Z. Wei, H. Lu and K.-K. R. Choo.2016
"Towards Lightweight Anonymous Entity
Authentication for IoT Applications. Information
Security and Privacy": 21st Australasian Conference,
ACISP 2016, Melbourne, VIC, Australia, July 4-6,
2016, Proceedings, Part I. J. K. Liu and R. Steinfeld.
Cham, Springer International Publishing, 265-280.
Yuan, W. 2016 "Dynamic Policy Update for Ciphertext-
Policy Attribute-Based Encryption." IACR Cryptology
ePrint Archive, 457.
Zain, J.M. 2010 "Strict authentication watermarking with
JPEG compression (SAW-JPEG) for medical images".
European Journal of Scientific Research, 42 (2), pp.
232-241.
Zhang, Y., D. Zheng, X. Chen, J. Li and H. Li. 2014
"Computationally efficient ciphertext-policy attribute-
based encryption with constant-size ciphertexts".
International Conference on Provable Security,
Zheng, M., Y. Xiang and H. Zhou. 2015 "A strong provably
secure IBE scheme without bilinear map." Journal of
Computer and System Sciences 81(1), 125-131.