共 15 条
[2]
Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255
[3]
Chen JH, 2011, J INF SCI ENG, V27, P437
[5]
Dodis Y, 2002, LECT NOTES COMPUT SC, V2332, P65
[6]
Gagne Martin, 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P295, DOI 10.1007/978-3-642-36334-4_19
[7]
Itkis G, 2002, LECT NOTES COMPUT SC, V2442, P499
[8]
Kefeng Wang, 2014, Information Security Practice and Experience. 10th International Conference, ISPEC 2014. Proceedings: LNCS 8434, P433, DOI 10.1007/978-3-319-06320-1_32
[9]
Li J., 2010, S INF COMP COMM SEC, P60, DOI [DOI 10.1145/1755688.1755697, 10.1145/1755688.1755697]