共 28 条
[1]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[2]
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[3]
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[4]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[5]
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[6]
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[7]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[8]
[江明明 Jiang Mingming], 2014, [电子与信息学报, Journal of Electronics & Information Technology], V36, P645
[9]
Jie Chen, 2012, Information Security and Privacy. Proceedings 17th Australasian Conference, ACISP 2012, P390, DOI 10.1007/978-3-642-31448-3_29
[10]
Lewko A, 2011, LECT NOTES COMPUT SC, V6632, P547, DOI 10.1007/978-3-642-20465-4_30