共 30 条
[1]
[Anonymous], EUROCRYPT
[2]
Beimel A., 1996, Doctor Science thesis
[3]
BELLARE M, 1993, ACM C COMP COMM SEC, P62
[4]
BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
[5]
Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
[6]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[7]
BONEH D, 2001, LNCS, V2139
[8]
Bradshaw R.W., 2004, P 11 ACM C COMP COMM, P146, DOI DOI 10.1145/1030083.1030104
[9]
Brickell E.F., 1989, J COMBIN MATH COMBIN, V6, P105
[10]
Chosen-ciphertext security from identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS,
2004, 3027
:207-222