共 34 条
[1]
Alshehri S., 2012 IEEE 28 INT C D, P143
[2]
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[3]
Benaloh J., P 2009 ACM WORKSH CL, P103
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[7]
Brickell E. F., 1991, Journal of Cryptology, V4, P123, DOI 10.1007/BF00196772
[8]
Emura Keita, 2012, International Journal of Applied Cryptography, V2, P199, DOI 10.1504/IJACT.2012.045589
[9]
Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11
[10]
Goyal V., 2006, P 2006 INT C PRIVACY, P1