共 50 条
- [31] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption [J]. Computer Journal, 2014, 58 (10): : 2778 - 2792
- [32] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption [J]. COMPUTER JOURNAL, 2015, 58 (10): : 2778 - 2792
- [33] A Secure Email Encryption Proxy Based on Identity-based Cryptography [J]. 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 284 - 286
- [35] Hierarchical identity-based inner product functional encryption [J]. INFORMATION SCIENCES, 2021, 573 : 332 - 344
- [36] Chosen-ciphertext secure hierarchical identity-based encryption from R-LWE [J]. Journal of Computers (Taiwan), 2020, 31 (01): : 320 - 331
- [40] A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks [J]. WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 62 - 67