共 45 条
- [1] Allouche JP, 2000, NOTES CELLULAR AUTOM
- [2] A MODULAR APPROACH TO KEY SAFEGUARDING [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 208 - 210
- [3] Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
- [4] BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
- [5] Bertilsson M., 1992, AUSCRYPT, V718, P67
- [6] Blakley G.R, 1979, P NAT COMP C, V48, DOI 10.1109/MARK.1979.8817296
- [7] Blundo C., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P150
- [8] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [9] BRICKELL EF, 1990, LECT NOTES COMPUT SC, V434, P468
- [10] Capocelli R. M., 1993, Journal of Cryptology, V6, P157, DOI 10.1007/BF00198463