共 27 条
- [1] [Anonymous], IACR CRYPTOLOGY EPRI
- [2] Arita Seiko, 2012, Information and Communication Security. 14th International Conference (ICICS 2012). Proceedings, P471, DOI 10.1007/978-3-642-34129-8_46
- [3] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
- [4] Beimel A., 1996, Secure schemes for secret sharing and key distribution
- [5] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [6] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
- [7] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
- [8] Boneh D, 2008, LECT NOTES COMPUT SC, V5350, P455, DOI 10.1007/978-3-540-89255-7_28
- [9] Chosen-ciphertext security from identity-based encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
- [10] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185