共 25 条
[1]
Asokan N., Shoup V., Waidner M., Optimistic fair exchange of digital signatures (extended abstract), EUROCRYPT, Volume 1403 of Lecture Notes in Computer Science, pp. 591-606, (1998)
[2]
Baek J., Safavi-Naini R., Susilo W., Public key encryption with keyword search revisited, ICCSA (1), Volume 5072 of Lecture Notes in Computer Science, pp. 1249-1259, (2008)
[3]
Bao F., An efficient verifiable encryption scheme for encryption of discrete logarithms, CARDIS, Volume 1820 of Lecture Notes in Computer Science, pp. 213-220, (1998)
[4]
Barth A., Boneh D., Waters B., Privacy in encrypted content distribution using private broadcast encryption, Financial Cryptography, Volume 4107 of Lecture Notes in Computer Science, pp. 52-64, (2006)
[5]
Boneh D., Boyen X., Efficient selective identity-based encryption without random oracles, J. Cryptology, 24, 4, pp. 659-693, (2011)
[6]
Boneh D., Crescenzo G.D., Ostrovsky R., Persiano G., Public key encryption with keyword search, EUROCRYPT, Volume 3027 of Lecture Notes in Computer Science, pp. 506-522, (2004)
[7]
Boneh D., Franklin M., Identity-based encryption from the weil pairing, CRYPTO, Volume 2139 of Lecture Notes in Computer Science, pp. 213-219, (2001)
[8]
Boneh D., Gentry C., Waters B., Collusion resistant broadcast encryption with short ciphertexts and private keys, CRYPTO, Volume 3621 of Lecture Notes in Computer Science, pp. 258-275, (2005)
[9]
Boneh D., Katz J., Improved efficiency for cca-secure cryptosystems built using identity-based encryption, CT-RSA, Volume 3376 of Lecture Notes in Computer Science, pp. 87-103, (2005)
[10]
Camenisch J., Lysyanskaya A., An efficient system for non-transferable anonymous credentials with optional anonymity revocation, EUROCRYPT, Volume 2045 of Lecture Notes in Computer Science, pp. 93-118, (2001)