2Diffie W, Hellman M E. New Directions in Cryptogra- phy[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
3Boneh D, Franklin M. Identity-based Eneryption from the Well Pairing[C]//Advances in Cryptology-CRYP- TO'01. Springer Berlin Heidelberg, 2001 .. 213-229.
4Sahai A, Waters B. Fuzzy Identity-based Encryption C ]//Advances in Cryptology-EUROCRYPT ' 05. Springer Berlin Heidelberg, 2005.. 457-473.
5Xhafa F, Feng J, Zhang Y, et al. Privacy-aware At- tribute-based PHR Sharing with User Accountability in Cloud Computing[J]. The Journal of Supercornput- ing, 2014(1).. 1-13.