Conjunctive Broadcast and Attribute-Based Encryption, pp.248-265, 2009. ,
DOI : 10.1007/11426639_27
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744
Identity-based encryption with efficient revocation, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.417-426, 2008. ,
DOI : 10.1145/1455770.1455823
Privacy-aware attribute-based encryption with user accountability, pp.121-130, 2009. ,
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
Attribute-based publishing with hidden credentials and hidden policies, pp.179-192, 2007. ,
Privacy-Aware Attribute-Based Encryption with User Accountability, pp.347-362, 2009. ,
DOI : 10.1007/3-540-48405-1_34
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud, pp.490-502, 2012. ,
DOI : 10.1007/978-3-642-34601-9_37
Secure threshold multi authority attribute based encryption without a central authority???, Information Sciences, vol.180, issue.13, pp.2618-2632, 2010. ,
DOI : 10.1016/j.ins.2010.03.004
Attribute-Based Broadcast Encryption Scheme Made Efficient, pp.325-342, 2008. ,
DOI : 10.1007/978-3-540-68164-9_22
URL : https://hal.archives-ouvertes.fr/hal-00378805
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures, pp.111-129, 2008. ,
DOI : 10.1007/978-3-540-68914-0_7
Adaptively attribute-hiding (hierarchical ) inner pro duct encryption, pp.591-608, 2012. ,
DOI : 10.1007/978-3-642-29011-4_35
Attribute-based encryption with nonmonotonic access structures, pp.195-203, 2007. ,
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption, pp.422-439, 2012. ,
DOI : 10.1007/978-3-642-28914-9_24
Fuzzy Identity-Based Encryption, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation, pp.373-382, 2013. ,
DOI : 10.1007/978-3-642-36818-9_41
URL : https://hal.archives-ouvertes.fr/hal-01480196