共 28 条
[2]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[3]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[4]
[Anonymous], 2016, IACR CRYPTOL EPRINT
[5]
Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
[6]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[8]
Boneh D, 2006, LECT NOTES COMPUT SC, V3958, P229
[9]
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741
[10]
Chosen-ciphertext security from identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS,
2004, 3027
:207-222