共 20 条
[1]
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]
Bellare M., 1994, ADV CRYPTOLOGY EUROC, V950, P92, DOI [10.1007/BFb0053428, DOI 10.1007/BFB0053428]
[5]
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:131-140
[6]
Chosen-ciphertext security from identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS,
2004, 3027
:207-222
[7]
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45
[9]
Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717