共 50 条
- [2] Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme Science China Mathematics, 2013, 56 : 1385 - 1401
- [3] Reconsideration on the security of the Boneh-Franklin identity-based encryption scheme PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 270 - 282
- [4] Verifiable Security of Boneh-Franklin Identity-Based Encryption PROVABLE SECURITY, 2011, 6980 : 68 - 83
- [5] Boneh-Franklin identity based encryption revisited AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 791 - 802
- [6] Improving the Boneh-Franklin Traitor Tracing Scheme PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 88 - +
- [8] Security of identity-based broadcast encryption Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
- [9] Identity-Based Encryption with Forward Security 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 287 - 290
- [10] An identity-based encryption scheme for broadcasting 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 123 - +