共 17 条
[1]
[Anonymous], 2001, LECT NOTES COMPUTER
[2]
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[3]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[4]
Boneh D, 2004, LECT NOTES COMPUT SC, V3152, P443
[5]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[7]
Chosen-ciphertext security from identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS,
2004, 3027
:207-222
[8]
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P131, DOI 10.1145/276698.276721
[9]
Cocks C.C., 2001, Lecture Notes in Computer Science, P360, DOI [DOI 10.1007/3-540-45325-3, DOI 10.1007/3-540-45325-332]
[10]
Delerablée C, 2007, LECT NOTES COMPUT SC, V4833, P200