共 41 条
[1]
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[3]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]
Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
[5]
Bellare M, 2012, LECT NOTES COMPUT SC, V7658, P331, DOI 10.1007/978-3-642-34961-4_21
[6]
Bellare M, 2011, LECT NOTES COMPUT SC, V7073, P486, DOI 10.1007/978-3-642-25385-0_26
[7]
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
[8]
Biham E, 2008, LECT NOTES COMPUT SC, V5157, P221, DOI 10.1007/978-3-540-85174-5_13
[9]
Boyle E, 2011, LECT NOTES COMPUT SC, V6632, P89, DOI 10.1007/978-3-642-20465-4_7
[10]
Chosen-ciphertext security from identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS,
2004, 3027
:207-222