共 72 条
- [11] Attrapadung N, 2009, LECT NOTES COMPUT SC, V5536, P168, DOI 10.1007/978-3-642-01957-9_11
- [12] Secret handshakes from pairing-based key agreements [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 180 - 196
- [13] Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 67 - 98
- [14] Bellare M., 2001, LNCS, V2248, P566, DOI DOI 10.1007/3-540-45682-133
- [15] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [16] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [17] Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
- [18] Castelluccia C, 2004, LECT NOTES COMPUT SC, V3329, P293
- [19] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
- [20] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121