共 8 条
- [1] E-cient identity-based encryption without random oracles. Waters B. Proc Eurocrypt 2005 . 2005
- [2] Public-key with non-interactive opening. Damgard I,Holfheins D,Kiltz E et al. Proc CT-RSA 2008 . 2008
- [3] Non-interactive proofs for integer multiplication. Damgard I,Thorbek R. Proc Eurocrypt 2007 . 2007
- [4] Identity-based cryptosystems and signature schemes. Shamir A. Proc.CRYPTO 1984 . 1984
- [5] Direct chosen cipher- text security from identity-based techniques. Boyen X,Mei Q X,Waters B. Proc ACM CCS 05 . 2005
- [6] Direct chosen-ciphertext secure identity-based encryptionin the standard model with short ciphertext. Kiltz E. CryptologyePrint Archive,Report2006/122 . 2006
- [7] Identity-based encryption from the Weil pairing. BONEH D,FRANKLIN M. SIAM Journal on Computing . 2003
- [8] Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertextattack. Cramer R,Shoup V. SIAM Journal on Computing . 2003