[1] Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pages 457–473. Springer, 2005.
[2] Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, pages 89–98, 2006.
[3] John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP’07), pages 321–334. IEEE, 2007.
[4] Takashi Nishide, Kazuki Yoneyama, and Kazuo Ohta. Attribute-based encryption with partially hidden encryptorspecified access structures. In Applied Cryptography and Network Security: 6th International Conference, ACNS
2008, New York, NY, USA, June 3-6, 2008. Proceedings 6, pages 111–129. Springer, 2008.
[5] Marloes Venema, Greg Alp´ar, and Jaap-Henk Hoepman. Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice. Designs, Codes and Cryptography, 91(1):165–220, 2023.
[6] Huiyong Wang, Jialing Liang, Yong Ding, Shijie Tang, and Yujue Wang. Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health. Computer Standards & Interfaces, 84:103696, 2023.
[7] Thomas Prantl, Timo Zeck, Lukas Horn, Lukas Iffl¨ander, Andr´e Bauer, Alexandra Dmitrienko, Christian Krupitzer, and Samuel Kounev. Towards a cryptography encyclopedia: a survey on attribute-based encryption. J. Surveill. Secur. Saf, 4:129–154, 2023.
[8] Dezhi Han, Nannan Pan, and Kuan-Ching Li. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing, 19(1):316–327, 2022.
[9] Gongcheng Hu, Leyou Zhang, Yi Mu, and Xiaoxu Gao. An expressive “test-decrypt-verify” attribute-based encryption scheme with hidden policy for smart medical cloud. IEEE Systems Journal, 15(1):365–376, 2020.
[10] Yinghui Zhang, Dong Zheng, and Robert H Deng. Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal, 5(3):2130–2145, 2018.
[11] Jonathan Katz, Amit Sahai, and Brent Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. Journal of cryptology, 26:191–224, 2013.
[12] Junzuo Lai, Robert H Deng, and Yingjiu Li. Fully secure cipertext-policy hiding cp-abe. In Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30–June 1, 2011. Proceedings 7, pages 24–39. Springer, 2011.
[13] Sheng Gao, Guirong Piao, Jianming Zhu, Xindi Ma, and Jianfeng Ma. Trustaccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Transactions on Vehicular Technology,
69(6):5784–5798, 2020.
[14] Yan Michalevsky and Marc Joye. Decentralized policy-hiding abe with receiver privacy. In Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II 23, pages 548–567. Springer, 2018.
[15] Fawad Khan, Hui Li, Liangxuan Zhang, and Jian Shen. An expressive hidden access policy cp-abe. In 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pages 178–186. IEEE, 2017.
[16] Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on encrypted data. In Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings 4, pages 535–554. Springer, 2007.
[17] Intae Kim, Willy Susilo, Joonsang Baek, and Jongkil Kim. Harnessing policy authenticity for hidden ciphertext policy attribute-based encryption. IEEE Transactions on Dependable and Secure Computing, 19(3):1856–1870, 2020.
[18] Junzuo LAI, Robert H DENG, and Yingjiu LI.Expressive cp-abe with partially hidden access structures.(2012). In AsiaCCS 2012: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, May
2-4, Seoul, Korea, pages 18–19.
[19] Leyou Zhang, Gongcheng Hu, Yi Mu, and Fatemeh Rezaeibagha. Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access, 7:33202–33213, 2019.
[20] Jianfeng Zong, Chen Wang, Jian Shen, Chunhua Su, and Weizheng Wang. Relac: Revocable and lightweight access control with blockchain for smart consumer electronics. IEEE Transactions on Consumer Electronics, 70(1):3994–4004, 2023.
[21] Xixi Yan, Guanghui He, Jinxia Yu, Yongli Tang, and Mingjie Zhao. Offline/online outsourced attribute-based encryption with partial policy hidden for the internet of things. Journal of Sensors, 2020(1):8861114, 2020.
[22] Qi Li, Gaozhan Liu, Qianqian Zhang, Lidong Han, Wei Chen, Rui Li, and Jinbo Xiong. Efficient and fine-grained access control with fully-hidden policies for cloud-enabled iot. Digital Communications and Networks, 2024.
[23] Weiwei Deng, Tao Xiang, and Xiaofeng Liao. Steac: Towards secure, traceable, and efficient cryptographic access control scheme in smart healthcare. Multimedia Tools and Applications, 81(21):30069–30092, 2022.