共 18 条
[2]
Camenisch J, 2004, LECT NOTES COMPUT SC, V3152, P56
[3]
[曹丹 Cao Dan], 2011, [电子与信息学报, Journal of Electronics & Information Technology], V33, P2922
[4]
Chow SSM, 2004, LECT NOTES COMPUT SC, V3269, P480
[5]
Hierarchical ID-based cryptography
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS,
2002, 2501
:548-566
[6]
Gerbush M, 2012, LECT NOTES COMPUT SC, V7658, P25, DOI 10.1007/978-3-642-34961-4_4
[8]
Jae Choon Cha, 2002, Public Key Cryptography - PKC 2003. 6th International Workshop on Practice and Theory in Public Key Cryptography. Proceedings (Lecture Notes in Computer Science Vol.2567), P18
[9]
Kate A, 2010, LECT NOTES COMPUT SC, V6280, P436, DOI 10.1007/978-3-642-15317-4_27
[10]
Lee B, 2004, ACSW 2004, V32, P69