共 18 条
- [1] Abdalla M(2008)Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions J. Cryptol. 21 350-391
- [2] Bellare M(2008)Provably secure timed-release public key encryption ACM Trans. Inf. Syst. Secur. 11 4:1-4:44
- [3] Catalano D(2007)Identity-based proxy re-encryption ACNS 2007 288-306
- [4] Kiltz E(2018)Identity-based encryption with hierarchical key-insulation in the standard model Des. Codes Cryptogr. 87 1005-1033
- [5] Kohno T(undefined)undefined undefined undefined undefined-undefined
- [6] Lange T(undefined)undefined undefined undefined undefined-undefined
- [7] Malone-Lee J(undefined)undefined undefined undefined undefined-undefined
- [8] Neven G(undefined)undefined undefined undefined undefined-undefined
- [9] Paillier P(undefined)undefined undefined undefined undefined-undefined
- [10] Shi H(undefined)undefined undefined undefined undefined-undefined