共 27 条
- [1] Bellare M., 1994, CRYPTO, P232
- [2] Bellare Mihir., 1998, STOC, P419
- [3] Hierarchical identity based encryption with constant size ciphertext [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
- [4] Boneh D., 2003, Contemporary Mathematics, P71, DOI DOI 10.1090/CONM/324/05731
- [5] Burmester M., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P275, DOI 10.1007/BFb0053443
- [7] Identity based authenticated key agreement protocols from pairings [J]. 16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 219 - 233
- [8] Choi KY, 2004, LECT NOTES COMPUT SC, V2947, P130
- [9] Chow SSM, 2007, LECT NOTES COMPUT SC, V4779, P203
- [10] Chow SSM, 2009, LECT NOTES COMPUT SC, V5443, P256