共 19 条
[1]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[2]
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[4]
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
[5]
Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
[6]
Chow SSM, 2004, LECT NOTES COMPUT SC, V3269, P480
[7]
Cocks Clifford, 2001, CRYPTOGRAPHY CODING, V2260, P360, DOI DOI 10.1007/3-540-45325-3
[8]
Hierarchical ID-based cryptography
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS,
2002, 2501
:548-566
[9]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[10]
Gordon SD, 2010, LECT NOTES COMPUT SC, V6477, P395, DOI 10.1007/978-3-642-17373-8_23