共 22 条
- [1] Attrapadung N, 2005, LECT NOTES COMPUT SC, V3788, P100
- [2] Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
- [3] Hierarchical identity based encryption with constant size ciphertext [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
- [4] Boneh D., 2006, P ACM C COMPUTER COM, P211, DOI [10.1145/1180405.1180432, DOI 10.1145/1180405.1180432]
- [5] Boneh D., 1999, CRYPTO, DOI DOI 10.1007/3-540-48405-1
- [6] Dodis Y, 2002, LECT NOTES COMPUT SC, V2696, P61
- [7] Dodis Y, 2003, LECT NOTES COMPUT SC, V2567, P100
- [8] Fiat A., 1994, LECT NOTES COMPUTER, V773, P480, DOI DOI 10.1007/3-540-48329-2
- [9] Fujisaki E., 1999, LNCS, V1666, P537, DOI DOI 10.1007/3-540-48405-1_34
- [10] Galindo D, 2005, LECT NOTES COMPUT SC, V3580, P791