共 11 条
[1]
Camenisch J., 1998, ETH SERIES INFORMATI, V2, P11
[4]
KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
[5]
LEE NY, 1998, LECT NOTES COMPUTER, P414
[6]
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[7]
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[8]
PEDERSEN TP, 1991, LECT NOTES COMPUT SC, V547, P221
[9]
RATON P, 1995, CRYPTOGRAPHY THEORY, P331