共 24 条
- [1] Aranha DF, 2011, LECT NOTES COMPUT SC, V6632, P48, DOI 10.1007/978-3-642-20465-4_5
- [2] Subgroup Security in Pairing-Based Cryptography [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 245 - 265
- [3] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [4] Beuchat JL, 2010, LECT NOTES COMPUT SC, V6487, P21, DOI 10.1007/978-3-642-17455-1_2
- [6] Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
- [7] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
- [8] Ducas L, 2010, LECT NOTES COMPUT SC, V5985, P148, DOI 10.1007/978-3-642-11925-5_11
- [9] Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47