共 17 条
[1]
[Anonymous], PROTECTING KEY EXPOS
[2]
[Anonymous], 1985, LNCS, DOI DOI 10.1007/3-540-39568-722
[3]
Boldyreva A., IDENTITY BASED ENCRY
[4]
Boneh D, 2005, LECT NOTES COMPUT SC, V3376, P87
[5]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[6]
Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
[7]
Chosen-ciphertext security from identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS,
2004, 3027
:207-222
[8]
Dodis Y, 2002, LECT NOTES COMPUT SC, V2332, P65
[10]
Hanaoka G, 2006, LECT NOTES COMPUT SC, V3958, P105