Conjunctive Broadcast and Attribute-Based Encryption Pairing-based Cryptography, LNCS, vol.5671, pp.248-265, 2009. ,
DOI : 10.1007/978-3-642-03298-1_16
Relations among Notions of Security for Public-key Encryption Schemes Advances in Cryptology, Proc. of Crypto'98, pp.26-45, 1998. ,
Broadcast Encryption Advances in Cryptology, Proc.of Crypto'93, pp.480-491, 1994. ,
Efficient tree-based revocation in groups of low-state devices Advances in Cryptology, Proc. of CRYPTO '04, pp.511-527, 2004. ,
Advances in Cryptology, Proc. of CRYPTO '02, pp.41-62, 2002. ,
Oceanstore: An architecture for globalscale persistent ,
Optimum traitor tracing and asymmetric schemes Advances in Cryptology, Proc. of Eurocrypt'98, pp.145-157, 1998. ,
DOI : 10.1007/bfb0054123
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.27.6042
A 2 BE: Accountable Attribute-based Encryption for Abuse Free Access Control, Cryptology ePrint Archive Report, p.118, 2009. ,
Cloud Computing and Outsourcing: Is Data Lost in the Fog, 2009. ,
Ivy: A read/write peer-topeer file system, Proceedings of OSDI'02, pp.31-44, 2002. ,
The LOCKSS peer-to-peer digital preservation system, ACM Transactions on Computer Systems, vol.23, issue.1, pp.2-50, 2005. ,
DOI : 10.1145/1047915.1047917
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.3373
Revocation and Tracing Schemes for Stateless Receivers, Advances in Cryptology,Proc. of Crypto'01, pp.41-62, 2001. ,
DOI : 10.1007/3-540-44647-8_3
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Ciphertexts, Pairing 07, pp.39-59, 2007. ,
Revocation Systems with Very Small Private Keys, Cryptology ePrint Archive Report, p.309, 2008. ,
Strong accountability for network storage, Proc. of FAST'07, 2007. ,
DOI : 10.1145/1288783.1288786