共 45 条
[1]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[2]
Ateniese G., 2005, P 12 ACM C COMP COMM, P310, DOI DOI 10.1145/1102120.1102161
[3]
Beimel A., 1996, SECURE SCHEMES SECRE
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[6]
Bonch D., 2001, POC 21 ANN INT CRYPT, P213
[7]
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems
[J].
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING,
2021, 8 (03)
:2048-2059