共 10 条
- [1] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
- [2] Bei Z., 2010, COMPUT ENG, V36, P155, DOI [10.3969/j.issn.1000-3428.2010.06.052, DOI 10.3969/J.ISSN.1000-3428.2010.06.052]
- [3] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
- [4] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [5] Dodis Y, 2002, LECT NOTES COMPUT SC, V2332, P65
- [6] Guo-hua C., 2009, COMPUT SCI, V36, P58
- [7] Hao-miao Y., 2006, J SICHUAN U ENG SCI, V1, P137
- [8] Li J., 2011, J NETW, V6, P1254
- [9] Meng X., 2009, J NE AGR U SOC SCI E, V1, P37
- [10] Ran C., 2003, LNCS, V2656