3BENALOH J( CHASE M, HORVITZ E, et al. Patient controlled en-cryption :ensuring privacy of electronic medical records [C] //Proc ofACM Workshop Cloud Computing Security. New York: ACM Press,2009:103-114.
4DONG Chang-yu, RUSSELLO G, DULAY N. Shared and searchableencrypted data for untrusted servers [C] //Proc of the 22nd Confe-rence on Data and Applications Security. Berlin : Springer, 2008 : 127-143,.
5SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Ad-vances in Cryptology. Berlin: Springer, 2005:457-473.
6GOYAL V, PANDEY 0,SAHAI A, et al. Attribute-based encryp-tion for fine-grained access control of encrypted data[C]//Proc of the13th ACM Conference on Computer and Communications Security.New York:ACM Press, 2006:89-98.
7BETHENCOURT J, SAHAI A,WATERS B. Ciphertext-policy attri-bute-based encryption [C] //Proc of IEEE Symposium on Security andPrivacy. Washington DC:IEEE Computer Society, 2007:321-334.
8CHEUNG L, NEWPORT C. Provably secure ciphertext policy ABE[C]//Proc of the 14th ACM Conference on Computer and Communi-cations Security. New York:ACM Press, 2007:456-465.
9GOYAL V, JAIN A, PANDEY 0,et al. Bounded ciphertext policyattribute based encryption [C] //Proc of the 35 th International Collo-quium on Automata, Languages and Programming. Berlin.. Springer,2008:579-591.
10YU Shu-cheng, WANG Cong, REN Kui, et al. Attribute based datasharing with attribute revocation [C] //Proc of the 5th ACM Symposi-um on Information, Computer and Communications Security. NewYork:ACM Press, 2010.