共 46 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[4]
Ameri MH, 2018, IEEE TRANS CLOUD COM, V1
[5]
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[6]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[8]
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I,
2014, 8616
:480-499
[9]
Boneh D, 2013, LECT NOTES COMPUT SC, V8043, P461, DOI 10.1007/978-3-642-40084-1_26
[10]
Cai J -W, 2013, THESIS NATL TAIWAN O, V2