[1] John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP’07), pages 321–334. IEEE, 2007.
[2] Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, pages 89–98, 2006.
[3] Sangjukta Das and Suyel Namasudra. Multiauthority cp-abe-based access control model for iotenabled healthcare infrastructure. IEEE Transactions on Industrial Informatics, 19(1):821–829, 2022.
[4] Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark,
May 22-26, 2005. Proceedings 24, pages 457–473. Springer, 2005.
[5] Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Fuqun Wang, and Kefei Chen. Revocable attribute-based encryption from standard lattices. Computer Standards & Interfaces, 84:103698, 2023.
[6] Susan Hohenberger, George Lu, Brent Waters, and David J Wu. Registered attribute-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 511–542. Springer, 2023.
[7] Dezhi Han, Nannan Pan, and Kuan-Ching Li.A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing, 19(1):316–327, 2020.
[8] Sucharita Khuntia and P Syam Kumar. New hidden policy cp-abe for big data access control with privacy-preserving policy in cloud computing. In 2018 9th international conference on computing, communication and networking technologies (ICCCNT), pages 1–7. IEEE, 2018.
[9] Javier Herranz. Attacking pairing-free attribute-based encryption schemes. IEEE access, 8:222226–222232, 2020.
[10] Vanga Odelu and Ashok Kumar Das. Design of a new cp-abe with constant-size secret keys for lightweight devices using elliptic curve cryptography. Security and Communication Networks, 9(17):4048–4059, 2016.
[11] Divyashikha Sethia, Raj Sahu, Sandeep Yadav, and Ram Kumar. Attribute revocation in ecc-based cp-abe scheme for lightweight resource-constrained devices. In 2021 International Conference on Communication, Control and Information Sciences (ICCISc), volume 1, pages 1–6. IEEE, 2021.
[12] Xuanxia Yao, Zhi Chen, and Ye Tian. A lightweight attribute-based encryption scheme for the internet of things. Future Generation Computer Systems, 49:104–112, 2015.
[13] Syh-Yuan Tan, Kin-Woon Yeow, and Seong Oun Hwang. Enhancement of a lightweight attribute-based encryption scheme for the internet of things. IEEE Internet of Things Journal, 6(4):6384–6395, 2019.
[14] K Sowjanya, Mou Dasgupta, Sangram Ray, and Mohammad S Obaidat. An efficient elliptic curve cryptography-based without pairing kpabe for internet of things. IEEE Systems Journal, 14(2):2154–2163, 2019.
[15] Sheng Ding, Chen Li, and Hui Li. A novel efficient pairing-free cp-abe based on elliptic curve cryptography for iot. IEEE Access, 6:27336–27345, 2018.
[16] Yong Wang, Biwen Chen, Lei Li, Qiang Ma, Huicong Li, and Debiao He. Efficient and secure ciphertext-policy attribute-based encryption without pairing for cloud-assisted smart grid. IEEE Access, 8:40704–40713, 2020.
[17] K Sowjanya, Mou Dasgupta, and Sangram Ray. A lightweight key management scheme for key-escrow-free ecc-based cp-abe for iot health-care systems. Journal of Systems Architecture, 117:102108, 2021.
[18] Yang Ming, Baokang He, and Chenhao Wang. Efficient revocable multi-authority attribute-based encryption for cloud storage. IEEE Access, 9:42593–42603, 2021.
[19] K Sowjanya and Mou Dasgupta. A ciphertext-policy attribute based encryption scheme for wireless body area networks based on ecc. Journal of Information Security and Applications, 54:102559, 2020.
[20] M Amirthavalli, S Chithra, and R Yugha. An improved pairing-free ciphertext policy framework for iot. Computer Systems Science & Engineering, 46(1), 2023.
[21] Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, and Minho Jo. Expressive cp-abe scheme for mobile devices in iot satisfying constant-size keys and ciphertexts. IEEE Access, 5:3273–3283, 2017.
[22] Dhaval Khandla, Het Shahy, Manish Kumar Bz, Alwyn Roshan Pais, and Nishant Raj. Expressive cp-abe scheme satisfying constant-size keys and ciphertexts. Cryptology ePrint Archive, 2019.
[23] Javier Herranz. Attribute-based encryption implies identity-based encryption. IET information security, 11(6):332–337, 2017.
[24] Yi-Fan Tseng, Jheng-Jia Huang, Hao-Yu Yang, Tsung-Yu Chien, and Chieh-Han Wu. Crypt-analysis and discussion on two attribute-based encryption schemes. In 2022 17th Asia Joint Conference on Information Security (AsiaJCIS), pages 24–28. IEEE, 2022.
[25] Yi-Fan Tseng and Jheng-Jia Huang. Crypt-analysis on two pairing-free ciphertext-policy attribute-based encryption schemes. In 2020 International Computer Symposium (ICS), pages 403–407. IEEE, 2020.
[26] Yi-Fan Tseng. Cryptanaylsis to sowjanya et al.’s abes from ecc. In 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, pages 287–294. Springer, 2022.
[27] Yi-Fan Tseng, Hao-Yu Yang, Chieh-Han Wu, Tsung-Yu Chien, Raylin Tso, Zi-Yuan Liu, and Jen-Chieh Hsu. Cryptanalysis to ming et al.’s revocable multi-authority attribute-based encryption. In 2022 17th Asia Joint Conference on Information Security (AsiaJCIS), pages 29–32. IEEE, 2022.
[28] Amos Beimel. Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, 1996.