共 24 条
- [1] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
- [2] Ateniese G., 2015, NDSS
- [3] Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19
- [4] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
- [5] Two Secure Anonymous Proxy-based Data Storages [J]. SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 251 - 258
- [7] Chosen-ciphertext security from identity-based encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
- [8] Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255
- [9] Canetti R., 2007, P 14 ACM CCS
- [10] Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189