共 44 条
[11]
Boneh D., 2006, P ACM C COMPUTER COM, P211
[12]
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I,
2014, 8616
:480-499
[13]
Boneh D, 2014, LECT NOTES COMPUT SC, V8616, P206, DOI 10.1007/978-3-662-44371-2_12
[14]
Chase M, 2016, 2016840 CRYPT EPRINT
[15]
Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II,
2016, 10032
:655-681
[16]
Chase M, 2014, LECT NOTES COMPUT SC, V8441, P622, DOI 10.1007/978-3-642-55220-5_34
[17]
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:595-624
[18]
Fully, (Almost) Tightly Secure IBE and Dual System Groups
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II,
2013, 8043
:435-460
[19]
Cheon JH, 2006, LECT NOTES COMPUT SC, V4004, P1
[20]
Coron JS, 2000, LECT NOTES COMPUT SC, V1880, P229