6van Dijk M,Gentry C,Halevi S,et al.Fully homomorphic encryption over the intergers[C]//Proceedings of EUROCRYPT 2010.Riviera,French:[s.n.],2010:24-43.
2CHRISTIAN C,IDIT K,SHRAER A.Trusting the cloud[J].ACMSIGACT News,2009,40(2):81-86.
3SAHAI A,WATES B.Fuzzy identity-based encryption[C]//Ad-vances in Cryptology-EUROCRYPT.Berlin:Springer-Verlag,2005:457-473.
4SHAMIR A.Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology CRYPTO’84.Berlin:Springer-Verlag,1984:47-53.
5BONEH D,FRANKLIN M.Identity-based encryption from the weilpairing[C]//Advances in Cryptology-CRYPTO’01.Berlin:Springer-Verlag,2001:213-229.
6BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attri-bute-based encryptio[C]//Proc of IEEE Sympoisum on Security andPrivacy.Washington DC:IEEE Computer Society,2007:321-334.
7CHEUNG L,NEWPORT C.Provably secure ciphertext policy ABE[C]//Proc of ACM Conference on Computer and Communications Se-curity.New York:ACM Press,2007:456-465.
8GOYAL V,JAIN A,PANDEY O,et al.Bounded ciphertext policyattribute based encryption[C]//Proc of ICALP.Berlin:Springer-Ver-lag,2008:579-591.
9LIANG X H,CAO Z F,LIN H,et al.Provably secure and efficientbounded ciphertext policy attribute based encryption[C]//Proc ofASIAN ACM Sympoisum on Information,Computer and Communica-tions Security.New York:ACM Press,2009:343-352.
10LBRAIMI L,TANG Q,HARTEL P,et al.Efficient and provable se-cure ciphertext-policy attribute-based encryption schemes[C]//Procof Information Security Practice and Experience.Berlin:Springer-Ver-lag,2009:1-12.