共 21 条
[1]
Chosen-ciphertext security from identity-based encryption. Dan Boneh,Ran Canetti,Shai Halevi,Jonathan Katz. SIAM Journal on Computing . 2006
[2]
Efficient identity-based encryption without random oracles. Waters B. Proceeding of Advances in Cryptology-Eurocrypt’2005 . 2005
[3]
Secure identity based encryption without random oracles. Dan Boneh,Xavier Boyen. Proceedings of Advances in Cryptology-Crypto’2004 . 2004
[4]
Identity-based cryptosystems and signature schemes. Shamir A. Advances in Cryptology - CRYPTO’84 . 1984
[5]
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. Cramer R,Shoup V. Advances in Cryptology-Crypto’98 . 1998
[6]
Lecture Notes in Computer Science
[C].
The First International Conference on Web-Age Information Management
,1600
[7]
Recommendation for Key Management,Part 1:General.Revision 3. Special Publication (SP)800-57 . 2012
[8]
Secure hash standard. NIST FIPS 180-4 . 2012
[9]
Handbook of mathematical tables and formulas. Burington R S,Lange N A. . 1965
[10]
Lecture Notes in Computer Science
[C].
The First International Conference on Web-Age Information Management
,1600