共 23 条
- [2] Attrapadung N, 2006, LECT NOTES COMPUT SC, V4284, P161
- [3] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
- [4] Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
- [5] Hierarchical identity based encryption with constant size ciphertext [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
- [6] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
- [7] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
- [8] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
- [9] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
- [10] Keyword Search Meets Membership Testing: Adaptive Security from SXDH [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2018, 2018, 11356 : 21 - 43