共 16 条
[1]
[Anonymous], 2013, INT J NETWORK SECURI
[2]
[Anonymous], 2012, J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl.
[3]
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[5]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[6]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]
Chai Q., 2012, P ICC
[8]
Genkin D., 2013, IACR Cryptology ePrint Archive, P857
[9]
Goyal V., 2006, ACM CCS 2006, P89, DOI DOI 10.1145/1180405.1180418