共 14 条
[1]
ANTON ER, 2002, P WORKSH QUAL SERV M, P1
[3]
BELLARE M, 2004, CACHIN CAMENISCH CC0, P171
[4]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[5]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[6]
BONEH D, 2001, LNCS, V2139
[7]
BONEH D, 2002080 CRYPT EPRINT
[8]
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741
[9]
CHING YN, 2006, J COMMUNICATIONS INF, V1, P24
[10]
Delerablée C, 2007, LECT NOTES COMPUT SC, V4833, P200