共 47 条
[21]
Joseph A, 2011, 2011617 CRYPT EPRINT
[22]
Katz J, 2008, LECT NOTES COMPUT SC, V4965, P146
[23]
Lenstra AK, 2000, LECT NOTES COMPUT SC, V1751, P446
[24]
Lewko A, 2012, LECT NOTES COMPUT SC, V7237, P318, DOI 10.1007/978-3-642-29011-4_20
[25]
Decentralizing Attribute-Based Encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011,
2011, 6632
:568-588
[26]
Lewko A, 2011, LECT NOTES COMPUT SC, V6632, P547, DOI 10.1007/978-3-642-20465-4_30
[27]
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010,
2010, 6110
:62-+
[28]
Miklau Gerome., 2003, P 29 INT C VERY LARG, P898, DOI DOI 10.1016/B978-012722442
[29]
Miyaji A., 2001, Information Security and Cryptology - ICISC 2000. Third International Conference. Proceedings (Lecture Notes in Computer Science Vol.2015), P90
[30]
National Institute of Standards and Technology, 2010, NIST SPEC PUBL