共 50 条
- [31] Tightly Secure Hierarchical Identity-Based Encryption [J]. Journal of Cryptology, 2020, 33 : 1787 - 1821
- [33] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
- [34] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
- [36] Key updating technique in identity-based encryption [J]. INFORMATION SCIENCES, 2011, 181 (11) : 2436 - 2440
- [37] Identity-based threshold key-insulated encryption without random oracles [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 203 - +
- [38] Identity Based Group Signatures from Hierarchical Identity-Based Encryption [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 150 - 170
- [39] Identity-based threshold decryption [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 262 - 276