共 12 条
[1]
Abelson H., 1997, The risks of key recovery, key escrow, and trusted third-party encryption
[2]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[4]
Au M. H., 2007, P 2 ACM S INF COMP C, P302
[7]
Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717
[8]
Dodis Y., P PKC 2003, P130
[9]
Gentry C, 2006, LECT NOTES COMPUT SC, V3958, P257
[10]
Shamir A., 1985, CRYPTO 1984 SANT BAR, V196, P47, DOI [10.1007/3-540-39568-7_5, 10.1007/3-540-39568-75, DOI 10.1007/3-540-39568-75]