共 42 条
[1]
Androulaki E, 2008, LECT NOTES COMPUT SC, V5134, P202, DOI 10.1007/978-3-540-70630-4_13
[2]
[Anonymous], 1988, P 12 ANN ACM S THEOR, DOI [DOI 10.1145/62212.62222, DOI 10.1145/62212]
[3]
Baric N., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P480
[4]
Barua M., 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P970, DOI 10.1109/INFCOMW.2011.5928953
[5]
Belenkiy M, 2007, IACR CRYPTOLOGY EPRI
[6]
Belenkiy M, 2009, LECT NOTES COMPUT SC, V5677, P108, DOI 10.1007/978-3-642-03356-8_7
[7]
Bethencourt J., 2010, P 14 INT C FIN CRYPT
[8]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[9]
Bethencourt J, 2010, LECT NOTES COMPUT SC, V6052, P400, DOI 10.1007/978-3-642-14577-3_35
[10]
Short group signatures
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS,
2004, 3152
:41-55