共 30 条
- [1] Abdalla M, 2006, LECT NOTES COMPUT SC, V4052, P300
- [3] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
- [4] Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
- [5] Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
- [6] Generating Shorter Bases for Hard Random Lattices [J]. THEORY OF COMPUTING SYSTEMS, 2011, 48 (03) : 535 - 553
- [7] Hierarchical identity based encryption with constant size ciphertext [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
- [8] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
- [9] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [10] Chosen-ciphertext security from identity-based encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222