共 17 条
[1]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[2]
[Anonymous], LNCS
[3]
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[4]
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[5]
Chick G.C., 1989, P ADV CRYPTOLOGY CRY, V435, P316
[6]
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:152-161
[9]
Guo FC, 2007, LECT NOTES COMPUT SC, V4575, P392
[10]
Fuzzy identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:457-473