共 35 条
- [1] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
- [2] Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
- [3] Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
- [4] Hierarchical identity based encryption with constant size ciphertext [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
- [5] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
- [6] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [7] Brakerski Z., 2022, P INN THEOR COMP SCI, V215
- [8] Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
- [9] Cocks C., 2001, Lecture Notes in Computer Science, V2260, P360, DOI [DOI 10.1007/3-540-45325-3, DOI 10.1007/3-540-45325-332, 10.1007/3-540-45325-3]
- [10] Cooper D., 2008, RFC 5280