共 26 条
[2]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
[5]
Boyen X., 2005, 2005288 CRYPT EPRINT
[6]
Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
[7]
Chosen-ciphertext security from identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS,
2004, 3027
:207-222
[8]
Catalano D, 2008, LECT NOTES COMPUT SC, V4939, P101
[9]
Chow SS, 2011, P 6 ACM S INF COMP C, P52, DOI DOI 10.1145/1966913.1966922
[10]
EVEN S, 1990, LECT NOTES COMPUT SC, V435, P263