共 22 条
[1]
[Anonymous], ID BASED RING SIGNAT
[2]
Beak J, J CRYPTOLOGY, P203
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Bresson E, 2002, LECT NOTES COMPUT SC, V2442, P465
[5]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[6]
Chen Y, 2006, P INT C WIRELESS COM, P189, DOI [10.1145/1143549.1143588, DOI 10.1145/1143549.1143588]
[7]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[8]
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[9]
Herranz J, 2003, LECT NOTES COMPUT SC, V2904, P266
[10]
Huang XY, 2005, AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, P649