共 37 条
[1]
Akinyele JosephA., 2011, P 1 ACM WORKSHOP SEC, P75, DOI DOI 10.1145/2046614.2046628
[2]
Comparing the pairing efficiency over composite-order and prime-order elliptic curves
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2013, 7954 LNCS
:357-372
[3]
[Anonymous], IACR CRYPTOLOGY EPRI
[4]
Attrapadung N., 2015, IACR CRYPTOLOGY EPRI, V2015, P431
[5]
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[6]
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[7]
Baden R, 2009, SIGCOMM 2009, P135
[8]
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[9]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[10]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535