共 36 条
[1]
[Anonymous], 2012, INT C INFORM SECURIT
[2]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]
Ateniese G., 2005, NDSS, P29
[4]
Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19
[5]
Bellare M, 2007, LECT NOTES COMPUT SC, V4450, P201
[6]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[7]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[8]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[9]
Boyen X, 2006, LECT NOTES COMPUT SC, V4117, P290
[10]
Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P196