共 13 条
[1]
Agrawal S., 2011, FUZZY IDENTITY BASED
[2]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[3]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[4]
Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
[5]
Alwen J., 2009, Proceedings of STACS, V09001, P75
[6]
[Anonymous], 2013, ACNS LECT NOTES COMP
[7]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[8]
Gordon SD, 2010, LECT NOTES COMPUT SC, V6477, P395, DOI 10.1007/978-3-642-17373-8_23
[9]
GROUP-ORIENTED (T,N) THRESHOLD DIGITAL SIGNATURE SCHEME AND DIGITAL MULTISIGNATURE
[J].
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES,
1994, 141 (05)
:307-313