1 D. Boneh, "Short signatures without random oracles and the SDH assumption in bilinear groups" 21 (21): 149-177, 2008
2 A. Beimel, "Secure schemes for secret sharing and key distribution" Technion 1996
3 L. Cheung, "Provably secure ciphertext policy ABE" ACM 456-465, 2007
4 S. D. Galbraith, "Pairings for cryptographers" 156 (156): 3113-3121, 2008
5 M. Chase, "Multi-authority attribute based encryption, Theory of cryptography" Springer 4392 : 515-534, 2007
6 V. Shoup, "Lower bounds for discrete logarithms and related problems, Advances in cryptology—EUROCRYPT ’97" Springer 1233 : 256-266, 1997
7 A. Sahai, "Fuzzy identity-based encryption, Advances in cryptology—EUROCRYPT 2005" Springer 3494 : 457-473, 2005
8 S. M¨uller, "Distributed attribute-based encryption" 2008
9 B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Tech. report" SRI International 2008
10 J. Bethencourt, "Ciphertext-policy attribute-based encryption" 321-334, 2007
1 D. Boneh, "Short signatures without random oracles and the SDH assumption in bilinear groups" 21 (21): 149-177, 2008
2 A. Beimel, "Secure schemes for secret sharing and key distribution" Technion 1996
3 L. Cheung, "Provably secure ciphertext policy ABE" ACM 456-465, 2007
4 S. D. Galbraith, "Pairings for cryptographers" 156 (156): 3113-3121, 2008
5 M. Chase, "Multi-authority attribute based encryption, Theory of cryptography" Springer 4392 : 515-534, 2007
6 V. Shoup, "Lower bounds for discrete logarithms and related problems, Advances in cryptology—EUROCRYPT ’97" Springer 1233 : 256-266, 1997
7 A. Sahai, "Fuzzy identity-based encryption, Advances in cryptology—EUROCRYPT 2005" Springer 3494 : 457-473, 2005
8 S. M¨uller, "Distributed attribute-based encryption" 2008
9 B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Tech. report" SRI International 2008
10 J. Bethencourt, "Ciphertext-policy attribute-based encryption" 321-334, 2007
11 V. Goyal, "Bounded ciphertext policy attribute based encryption"
12 V. Goyal, "Attribute-based encryption for finegrained access control of encrypted data" ACM 89-98, 2006
13 D. R. Stinson, "An explication of secret sharing schemes" 2 (2): 357-390, 1992
14 D.Boneh, "A brief look at pairings based cryptography" IEEE Computer Society 19-26, 2007