共 54 条
[1]
Au W., P INT C SEC CRYPT NE
[2]
Baron K., P INT C APPL CRYPT N
[3]
Bauer L. Jia, P IEEE 23 COMP SEC F
[4]
Belenkiy M, 2009, LECT NOTES COMPUT SC, V5677, P108, DOI 10.1007/978-3-642-03356-8_7
[5]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Bichsel J., 2009, Tech. Rep. RZ3730
[7]
Foundations of Fully Dynamic Group Signatures
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016,
2016, 9696
:117-136
[9]
Brickell E., 2004, 11 ACM C COMP COMM S, P132, DOI [10.1145/1030083.1030103, DOI 10.1145/1030083.1030103]
[10]
Camenisch J, 2004, LECT NOTES COMPUT SC, V3152, P56