共 24 条
- [1] Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
- [2] Applebaum B., 2011, ICS 2011, V2011, P45
- [3] Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
- [4] Bellare M, 2012, LECT NOTES COMPUT SC, V7658, P331, DOI 10.1007/978-3-642-34961-4_21
- [5] Bellare M, 2010, LECT NOTES COMPUT SC, V6223, P666, DOI 10.1007/978-3-642-14623-7_36
- [6] Biham E., 1993, Advances in Cryptology - EUROCRYPT'93, V765, P398
- [8] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [9] Towards constant bandwidth overhead integrity checking of untrusted data [J]. 2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 139 - 153
- [10] Gazzoni Filho DL., 2006, IACR CRYPTOLOGY EPRI, V2006, P150