[1. Tu, S., S. Niu, H. Li. A Fine-Grained Access Control and Revocation Scheme on Clouds. Concurrency Comput. Pract. Exper, 2012, ISSN: 15320626, DOI: 10.1002/cpe.2956.10.1002/cpe.2956]Search in Google Scholar
[2. Shamir. Identity-Based Eryptosystem and Signature Schemes. - In: Proc. of CRYPTO’84 Conf., 1984, ISBN: 978-3-540-15658-1, 47-53.]Search in Google Scholar
[3. Boneh, D., M. Franklin. Identity-Based Encryption from the Weil Pairing. - In: Proc. of Crypto’2001 Conf., 2001, ISBN: 978-3-540-42456-7, 213-229.10.1007/3-540-44647-8_13]Search in Google Scholar
[4. Selvi, S., S. Vivek, N. Jain. Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. - In: Proc. of EUC’08 Conf., 2008, ISBN: 978-0-7695-3492-3, 127-132.]Search in Google Scholar
[5. Selvi, S., S. Vivek, R. Gopalakrishnan. Cryptanalysis of Mu et al.'s and Li et al.'s Schemes anda Provably Secure id-Based Broadcast Signcryption (IBBSC) Seheme. - In: Proc. of WISA 2008 Conf., 2009, ISBN: 978-3-642-00305-9, 115-129.10.1007/978-3-642-00306-6_9]Search in Google Scholar
[6. Gentry, C., S. Halevi. Hierarchical Identity Based Encryption with Polynomially Many Levels. - In: Proc. of TCC Conf., 2009, ISBN: 978-3-642-00456-8, 437-456.10.1007/978-3-642-00457-5_26]Search in Google Scholar
[7. Waters, B. Dual System Encryption: Realizing Fully Secure IBEand HIBE Under Simple Assumptions. - In: Proc. of CRYPTO’2009 Conf., 2009, ISBN: 978-3-642-03355-1, 619-636.]Search in Google Scholar
[8. Boyen, X. Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography. - In: Proc. of CRYPTO’2003 Conf., 2003, ISBN: 978-3-540-40674-7, 383-399.]Search in Google Scholar
[9. Chase, M. Multi-Authority Attribute Based Encryption. - In: Proc. of TCC Conf., 2007, ISBN: 978-3-540-70935-0, 515-534.10.1007/978-3-540-70936-7_28]Search in Google Scholar
[10. Chase, M., S. Chow. Improving Privacy and Security in Multi-Authority Attribute-Based Encryption. - In: Proc. of ACM CCS Conf., 2009, ISBN: 978-1-60558-894-0, 121-130.]Search in Google Scholar
[11. Maji, H., M. Prabhakaran, M. Rosulek. Attribute-Based Signature: Achieving Attribute- Privacy and Collusion-Resistance, 2008. http://eprint.iacr.org/2008/328]Search in Google Scholar
[12. Khader, D. Attribute Based Group Signature With Revocation, 2007. http://eprint.iacr.org/2007/241.]Search in Google Scholar
[13. Yu, S., C. Wang, K. Ren, W. Lou. Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. - In: Proc. of INFOCOM Conf., 2010, ISBN: 978-1-4244-5836-3, 534-542.]Search in Google Scholar
[14. Goh, E., H. Shacham, N. Modadugu, D. Boneh. Sirius: Securing Remote Untrusted Storage. - In: Proc. of NDSS Conf., 2003, ISBN: 1-891562-16-9, 131-145.]Search in Google Scholar
[15. Blaze, M., G. Bleumer, M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. - In: Proc. of EUROCRYPT’98 Conf., 1998, ISBN: 978-3-540-64518-4, 127-144.10.1007/BFb0054122]Search in Google Scholar
[16. Wang, G., Q. Liu, J. Wu. Achieving Fine-Grained Access Control for Secure Data Sharing on Cloud Servers. - Concurrency Comput. Pract. Exper., Vol. 23, 2011, No 12, 1443-1464.10.1002/cpe.1698]Search in Google Scholar
[17. Wang, G., Q. Liu, J. Wu, M. Guo. Hierarchical Attribute-Based Encryption and Scalable User Revocation for Sharing Data in Cloud Servers. - Computers and Security, Vol. 30, 2011, No 5, 320-331.10.1016/j.cose.2011.05.006]Search in Google Scholar
[18. Yu, S., C. Wang, K. Ren. Attribute Based Data Sharing With Attribute Revocation. - In: Proc. of ASIACCS Conf., 2010, ISBN: 978-1-60558-936-7, 261-270. ]Search in Google Scholar