共 37 条
[1]
Abdalla M, 2007, LECT NOTES COMPUT SC, V4734, P139
[2]
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[7]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[9]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[10]
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47