共 44 条
- [1] Abdalla M, 2007, LECT NOTES COMPUT SC, V4734, P139
- [2] Match Me if You Can: Matchmaking Encryption and Its Applications [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 701 - 731
- [3] Attrapadung N, 2009, LECT NOTES COMPUT SC, V5536, P168, DOI 10.1007/978-3-642-01957-9_11
- [4] Hierarchical identity based encryption with constant size ciphertext [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
- [5] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [6] Threshold Cryptosystems from Threshold Fully Homomorphic Encryption [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 565 - 596
- [7] Boyen X, 2006, LECT NOTES COMPUT SC, V4117, P290
- [8] Threshold Password-Hardened Encryption Services [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 409 - 424
- [9] Survey of access control models and technologies for cloud computing [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S6111 - S6122
- [10] Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255