共 50 条
- [1] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [2] Efficient identity-based multicast scheme from bilinear pairing [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (06): : 877 - 882
- [3] Identity-based aggregate and verifiably encrypted signatures from bilinear pairing [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 1046 - 1054
- [4] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
- [5] An Improved Identity-Based Encryption Scheme without Bilinear Map [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 374 - 377
- [6] An identity-based authenticated key agreement protocol without bilinear pairing [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (05): : 1241 - 1244
- [7] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
- [9] Efficient Identity-Based Encryption from LWR [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
- [10] Puncturable Identity-Based Encryption from Lattices [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589