共 45 条
[1]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[2]
Biham E, 2008, LECT NOTES COMPUT SC, V5157, P221, DOI 10.1007/978-3-540-85174-5_13
[3]
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[4]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[7]
Boneh D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P37
[9]
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453