共 24 条
- [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
- [2] [Anonymous], 2013, INT J NETWORK SECURI
- [3] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
- [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
- [5] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
- [6] Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
- [8] Cocks C.C., 2001, Lecture Notes in Computer Science, P360, DOI [DOI 10.1007/3-540-45325-3, DOI 10.1007/3-540-45325-332]
- [10] PKE-AET: Public Key Encryption with Authorized Equality Test [J]. COMPUTER JOURNAL, 2015, 58 (10) : 2686 - 2697