共 17 条
[1]
Al-Riyami S.S., Cryptographic schemes based on elliptic curve pairings, (2004)
[2]
Al-Riyami S.S., Paterson K.G., Certificateless public key cryptography, Advances in Cryptology - ASIACRYPT 2003, 2894, pp. 452-473, (2003)
[3]
Benaloh J., Leichter J., Generalized secret sharing and monotone functions, Advances in Cryptology - CRYPTO '88, 403, pp. 27-35, (1990)
[4]
Blake I.F., Seroussi G., Smart N.P., Advances in Elliptic Curve Cryptography, (2005)
[5]
Boneh D., Franklin M., Identity based encryption from the Weil pairing, Advances in Cryptology - CRYPTO 2001, 2139, pp. 213-229, (2001)
[6]
Boneh D., Lynn B., Shacham H., Short signatures from the Weil pairing, Advances in Cryptology - ASIACRYPT 2001, 2248, pp. 514-532, (2001)
[7]
Bradshaw R.W., Holt J.E., Seamons K.E., Concealing complex policies with hidden credentials, Proceedings of the 11th ACM Conference on Computer and Communications Security, (2004)
[8]
Chen L., Harrison K., Soldera D., Smart N.P., Applications of multiple trust authorities in pairing based cryptosystems, Infrastructure Security: InfraSec 2002, 2437, pp. 260-275, (2002)
[9]
Duursma I., Lee H.-S., Tate pairing implementation for hyperelliptic curves y<sup>2</sup> = x<sup>p</sup> - x. + d, Advances in Cryptology - ASIACRYPT 2003, 2894, pp. 111-123, (2003)
[10]
Fujisaki E., Okamoto T., Secure integration of asymmetric and symmetric encryption schemes, Advances in Cryptology - CRYPTO '99, 1666, pp. 537-554, (1999)