共 5 条
[1]
Evaluating 2-DNFformulas onciphertexts. Boneh D,Goh E,Nissi m K. Theory of Cryptography—TCC2005 . 2005
[2]
Efficient multi-receiver i-dentity-based encryption and its application to broadcast encryption. BAEK J,SAFAVI-NAINI R,SUSILO W. PKC‘‘‘‘05:Proceedings of Public Key Cryptography . 2005
[3]
Identity-based Broadcast Encryp-tion Protocol for Ad Hoc Networks. Zhang L Y,Hu Y P,Mu N B. . 2009
[4]
Provably Secure ID-based Broadcast Signcryption (IBBSC) Scheme. Selvi S S D,Vivek S S,Gopalakrishnan R, et al. Cryptology ePrint ArchiveReport2008/ 225 . 2008
[5]
An ID-based broadcastencryption scheme for collaborative design. Zhang Y L,Zhang Y K,Zhang J. InternationalConference on Networks Security,Wireless Communicationsand Trusted ComputingNSWCTC . 2009