共 14 条
[1]
Baek J, 2004, LECT NOTES COMPUT SC, V2947, P262
[2]
Baek J, 2004, ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, P124
[3]
Identity-based signature scheme based on quadratic residues
[J].
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES,
2007, 50 (03)
:373-380
[5]
Efficient identity based signature schemes based on pairings
[J].
SELECTED AREAS IN CRYPTOGRAPHY,
2003, 2595
:310-324
[6]
Fuzzy identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:457-473
[8]
Shamir A., 1985, WORKSHOP THEORY APPL, V196, P47, DOI [10.1007/3-540-39568-7_5, 10.1007/3-540-39568-75]