| Citation: | WANG Shangping, YU Xiaojuan, ZHANG Yaling. Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists[J]. Journal of Electronics & Information Technology, 2016, 38(6): 1406-1411. doi: 10.11999/JEIT150845 | 
 
	                | SAHAI A and WATERS B. Fuzzy identity-based encryption [J]. Lecture Notes in Computer Science, 2005, 3494: 457-473. doi:  10.1007/11426639_27. | 
| YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]. ACM Symposium on Information, ACM, 2010: 261-270. doi: 10.1145/1755688. 1755720. | 
| PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 99-112. | 
| BOLDYREVA A, GOYAL V, and KUMAR V. Identity- based encryption with efficient revocation[C]. Proceedings of the 15th ACM Conference on Computer and Communications Security, New York, 2008: 417-426. | 
| HINEK M J, JIANG S, SAFAVI-NAINI R, et al. Attribute- based encryption with key cloning protection[J]. Bulletin of the Korean Mathematical Society, 2008, 2008(4): 803-819. | 
| LI J, REN K, and KIM K. A2BE: Accountable attribute- based encryption for abuse free access control[J]. IACR Cryptology ePrint Archive, 2009: 118. | 
| ATTRAPADUNG N and IMAI H. Conjunctive broadcast and attribute-based encryption[C]. Lecture Notes in Computer Science, 2009, 5671: 248-265. doi: 10.1007/ 978-3-642-03298-1_16. | 
| LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]. Advances in Cryptology-EUROCRYPT 2010, Springer Berlin Heidelberg, 2010, 6110: 62-91. doi:  10.1007/978-3-642-13190-5_4. | 
| VLADIMIR B, DANIEL S, STEINWANDT R, et al. Multi-authority attribute-based encryption with honest-but- curious central authority[J]. International Journal of Computer Mathematics, 2011, 89(3): 268-283. | 
| LI Q, FENG D, and ZHANG L. An attribute based encryption scheme with fine-grained attribute revocation[C]. Global Communications Conference (GLOBECOM), 2012 IEEE, Anaheim, CA, 2012: 885-890. doi: 10.1109/ GLOCOM. 2012.6503225. | 
| 张彦华, 胡予濮, 江明明, 等. 格上可撤销的基于身份的适应性安全的加密方案[J]. 电子与信息学报, 2015, 37(2): 423-428. doi:  10.11999/JEIT140421. | 
| ZHANG Yanhua, HU Yupu, JIANG Mingming et al. A lattice-based revocable adaptive-ID secure encryption scheme [J]. Journal of Electronics  Information Technology, 2015, 37(2): 423-428. doi:  10.11999/JEIT140421. | 
| LI Yang, ZHU Jianming, WANG Xiuli, et al. Optimized ciphertext-policy attribute-based encryption with efficient revocation[J]. International Journal of Security and Its Applications, 2013, 7(6): 385-394. | 
| 张应辉, 郑东, 李进, 等. 密文长度恒定且属性直接可撤销的基于属性的加密[J]. 密码学报, 2014, 1(5): 465-480. | 
| ZHANG Yinghui, ZHENG Dong, LI Jin, et al. Attribute directly-revocable attribute-based encryption with constant ciphertext length[J]. Journal of Cryptologic Research, 2014, 1(5): 465-480. | 
| VANCE A, LOWRY P B, and EGGETT D. A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface[J]. MIS Quarterly, 2015, 39(2): 345-366. | 
| CL?MENTINE G, SUSILO W, and PLANTARD T. Efficient File Sharing in Electronic Health Records [M].?Information Security Practice and Experience. Springer International Publishing, 2015: 499-513. | 
| 魏江宏, 胡学先, 刘文芬. 多属性机构环境下的属性基认证密钥交换协议[J]. 电子与信息学报, 2012, 34(2): 451-456. doi:  10.3724/SP.J.1146.2011.00701. | 
| WEI Jianghong, HU Xuexian, and LIU Wenfen. Attribute- based authenticated key exchange protocol in multiple attribute authorities environment[J]. Journal of Electronics  Information Technology, 2012, 34(2): 451-456. doi: 10.3724/ SP.J.1146.2011.00701. | 
