共 24 条
[1]
Abdalla M., Catalano D., Dent A.W., Malone-Lee J., Neven G., Smart N.P., Identity-based encryption gone wild, Automata, Languages and Programming, pp. 300-311, (2006)
[2]
Au M.H., Huang Q., Liu J.K., Susilo W., Wong D.S., Yang G., Traceable and retrievable identity-based encryption, Applied Cryptography and Network Security, pp. 94-110, (2008)
[3]
Bellare M., Goldreich O., On defining proofs of knowledge, Advances in Cryptology-CRYPTO'92, pp. 390-420, (1993)
[4]
Escala A., Herranz J., Morillo P., Revocable attribute-based signatures with adaptive security in the standard model, Progress in Cryptology AFRICACRYPT 2011, 6737, pp. 224-241, (2011)
[5]
Goyal V., Reducing trust in the PKG in identity based cryptosystems, Advances in Cryptology-CRYPTO'07, pp. 430-447, (2007)
[6]
Goyal V., Lu S., Sahai A., Et al., Black-box accountable authority identity-based encryption, Proceedings of the 15th ACM Conference on Computer and Communications Security, ACM, pp. 427-436, (2008)
[7]
Guo S.Q., Zeng Y.P., Attribute-based signature scheme, International Conference on Information Security and Assurance, 2008, ISA 2008, IEEE, pp. 509-511, (2008)
[8]
Herranz J., Laguillaumie F., Libert B., Rfols C., Safavi-Naini R., Shahandashti S.F., Short attribute-based signatures for threshold predicates, Topics in Cryptology-CT-RSA 2012, 7178, pp. 51-67, (2012)
[9]
Hinek M.J., Jiang S., Safavi-Naini R., Shahandashti S.F., Attribute-based Encryption with Key Cloning Protection, (2008)
[10]
Khader D., Attribute Based Group Signatures, (2007)