J. Bethencourt, A. Sahai, and B. Waters, A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram, 2007 IEEE Symposium on Security and Privacy, pp.321-334, 2007.

L. Li, T. Gu, L. Chang, J. Li, and J. Qian, CP-ABE based Access Control with Policy Updating and Fast Decryption for Intelligent Manufacturing, J. Journal of Internet Technology, vol.19, issue.3, pp.825-836, 2018.

D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, Public Key Encryption with Keyword Search, J. Eurocrypt, vol.3027, pp.506-522, 2004.

X. Liu, J. Ma, J. Xiong, and G. Liu, Ciphertext-policy Hierarchical Attribute-based Encryption for Fine-grained Access Control of Encryption Data, J. International Journal of Network Security, vol.16, pp.437-443, 2014.

A. Balu and K. Kuppusamy, Ciphertext-Policy Attribute-Based Encryption with User Revocation Support, International Conference on Heterogeneous Networking for Quality, Reliability, pp.696-705, 2013.

C. I. Fan, S. M. Huang, and H. M. Ruan, Arbitrary-State Attribute-Based Encryption with Dynamic Membership, J.: IEEE Transactions on Computers, vol.63, issue.8, pp.1951-1961, 2014.

S. Wang, J. Zhou, J. K. Liu, J. Yu, and J. Chen, An Efficient File Hierarchy AttributeBased Encryption Scheme in Cloud Computing, J. IEEE Transactions on Information Forensics and Security, pp.1265-1277, 2017.

J. Hur and K. N. Dong, Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and Distributed Systems, vol.22, pp.1214-1221, 2011.

L. Li, T. Gu, L. Chang, Z. Xu, Y. Liu et al., A Ciphertext-Policy AttributeBased Encryption Based on an Ordered Binary Decision Diagram, J. IEEE Access, vol.5, pp.1137-1145, 2017.

W. Sun, B. Wang, . Cao, M. Li, and W. Lou, Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, J. IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.11, pp.3025-3035, 2014.

C. Ling and C. Newport, Provably Secure Ciphertext Policy ABE, 2007 ACM Conference on Computer and Communications Security, pp.456-465, 2007.