共 29 条
- [1] Shamir A., Identity-based cryptosystems and signature schemes, In Advances In Cryptology-crypto, pp. 47-53, (1984)
- [2] Boneh D., Franklin M., Identity-based encryption from the Weil pairing, In Advances In Crptology-crypto, pp. 213-229, (2001)
- [3] Al-Riyami S.S., Paterson K.G., Certificateless public key cryptography, In Advances In Cryptology-asiacrypt, pp. 452-473, (2003)
- [4] Al-Riyami S.S., Paterson K.G., Cbe From Cl-pke: A Generic Construction and Efficient Schemes, pp. 398-415, (2005)
- [5] Gentry C., Certificate-based Encryption and the Certificate Revocation Problem, In Advances In Cryptology-eurocrypt, pp. 272-293, (2003)
- [6] Housley R., Polk W., Ford W., Solo D., Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (crl) Profile, (2002)
- [7] Myers M., Ankney R., Malpani A., Galperin S., Adams C., X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-ocsp, (1999)
- [8] Yum D.H., Lee P.J., Identity-based Cryptography In Public Key Management, pp. 71-84, (2004)
- [9] Galindo D., Morillo P., Rafols C., Breaking Yum and Lee Generic Constructions of Certificate-less and Certificate-based Encryption Schemes, pp. 81-91, (2006)
- [10] Galindo D., Morillo P., Rafols C., Improved Certificate-based Encryption in the Standard Model, Journal of Systems and Software, Elsevier, 81, 7, pp. 1218-1226, (2008)