共 31 条
[1]
Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
[2]
Comparing the pairing efficiency over composite-order and prime-order elliptic curves
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2013, 7954 LNCS
:357-372
[3]
[Anonymous], 2013, PAIRING BASED CRYPTO
[4]
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[5]
Blazy O, 2014, LECT NOTES COMPUT SC, V8616, P408, DOI 10.1007/978-3-662-44371-2_23
[6]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[7]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[9]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[10]
Boneh D, 2014, LECT NOTES COMPUT SC, V8441, P533, DOI 10.1007/978-3-642-55220-5_30