共 25 条
[3]
[Anonymous], 1996, SECURE SCHEMES SECRE
[4]
Attrapadung Nuttapong, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P87, DOI 10.1007/978-3-319-16715-2_5
[5]
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[6]
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
[7]
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[8]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[9]
Fiat A., 1993, LNCS, P480, DOI [DOI 10.1007/3-540-48329-240, DOI 10.1007/3-540-48329-2]
[10]
Goodrich MT, 2004, LECT NOTES COMPUT SC, V3152, P511