共 26 条
[1]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[2]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[3]
Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
[4]
Match Me if You Can: Matchmaking Encryption and Its Applications
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II,
2019, 11693
:701-731
[6]
Secret handshakes from pairing-based key agreements
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:180-196
[7]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[9]
Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11
[10]
Gentry C, 2008, ACM S THEORY COMPUT, P197