共 50 条
- [42] Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2012, 314 : 233 - +
- [43] Broadcast encryption using identity-based public-key cryptosystem [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 1092 - 1097
- [44] A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 594 - 603
- [48] Dealerless Corporate Key Generation for Identity-Based Encryption Schemes [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 211 - 222
- [49] Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1093 - 1107
- [50] Quantum public-key encryption schemes based on conjugate coding [J]. Quantum Information Processing, 2020, 19