共 50 条
- [43] Generalized key delegation for hierarchical identity-based encryption [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 139 - 154
- [45] Private Key Management in Hierarchical Identity-Based Encryption [J]. SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212
- [46] Unbounded Hierarchical Identity-based Encryption in the Standard Model [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (01): : 105 - 112
- [48] Practical Identity-Based Encryption without random oracles [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 445 - 464
- [50] An Efficient Identity-Based Deniable Authenticated Encryption Scheme [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919