共 50 条
- [2] Identity-Based Encryption with Verifiable Outsourced Revocation [J]. COMPUTER JOURNAL, 2016, 59 (11): : 1659 - 1668
- [6] How to solve key escrow and identity revocation in identity-based encryption schemes [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 290 - 303
- [7] Identity-based encryption and hierarchical identity-based encryption [J]. Cryptology Inf. Secur. Ser., 2009, (45-64):
- [8] Efficient Identity-Based Encryption from LWR [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
- [9] Efficient Identity-based Encryption from Lattice [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 84 - 90