共 50 条
- [31] Scalable Wildcarded Identity-Based Encryption [J]. COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 269 - 287
- [32] Identity-Based Encryption with Forward Security [J]. 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 287 - 290
- [33] Identity-based encryption gone wild [J]. AUTOMATA, LANGAGES AND PROGRAMMING, PT 2, 2006, 4052 : 300 - 311
- [34] Identity-Based Group Encryption Revisited [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 205 - 209
- [35] On the Power of Hierarchical Identity-Based Encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 243 - 272
- [36] Identification of parts in identity-based encryption [J]. INTERNET SOCIETY: ADVANCES IN LEARNING, COMMERCE AND SOCIETY, 2004, 1 : 177 - 181
- [37] Identity-Based Encryption in the Internet of Things [J]. 29TH IEEE CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS (SIU 2021), 2021,
- [38] Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 117 - 129
- [40] Proxy re-encryption systems for identity-based encryption [J]. Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267