共 49 条
[1]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]
Alawatugoda Janaka, 2015, Cryptography and Coding. 15th IMA International Conference, IMACC 2015. Proceedings: LNCS 9496, P277, DOI 10.1007/978-3-319-27239-9_17
[3]
Alawatugoda J., 2014, ASIACCS, P207
[4]
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[6]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[7]
Biham E, 2008, LECT NOTES COMPUT SC, V5157, P221, DOI 10.1007/978-3-540-85174-5_13
[8]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[10]
Boneh D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P37