共 31 条
[1]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[2]
Alomair B, 2009, J UNIVERS COMPUT SCI, V15, P2937
[3]
[Anonymous], TECH REP
[6]
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103, DOI DOI 10.1145/1655008.1655024
[7]
Boneh D., 2003, Contemporary Mathematics, P71, DOI DOI 10.1090/CONM/324/05731
[8]
Boneh D., 2001, LECT NOTES COMPUTER, V44, P389
[9]
Boneh D, 2014, LECT NOTES COMPUT SC, V8616, P206, DOI 10.1007/978-3-662-44371-2_12
[10]
Chosen-ciphertext security from identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS,
2004, 3027
:207-222