共 19 条
[1]
Baek J, 2004, IAS 04 TRACK ITCC 04, p124 128
[2]
Boldyreva A, 2003, LECT NOTES COMPUT SC, V2567, P31
[3]
Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
[4]
BONEH D, 2001, LNCS, V2139
[5]
Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
[6]
Chaum David., 1982, ADV CRYPTO 82, P199, DOI [10.1007/978-1-4757-0602-4_18, DOI 10.1007/978-1-4757-0602-4_18]
[7]
Galbraith SD, 2002, LECT NOTES COMPUT SC, V2369, P324
[8]
Efficient identity based signature schemes based on pairings
[J].
SELECTED AREAS IN CRYPTOGRAPHY,
2003, 2595
:310-324
[9]
Horster P., 1995, Proceedings. 11th Annual Computer Security Applications Conference, P149
[10]
HWANG J, 2001, 2001 NAT COMP S INF, pF19