共 50 条
- [1] Distributed Private-Key Generators for Identity-Based Cryptography [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 436 - 453
- [2] Private Key Management in Hierarchical Identity-Based Encryption [J]. SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212
- [3] Making Any Identity-Based Encryption Accountable, Efficiently [J]. COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 326 - 346
- [4] Key-Private Identity-Based Proxy Re-Encryption [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 633 - 647
- [5] Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 192 - 211
- [7] Black-Box Accountable Authority Identity-Based Encryption [J]. CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 427 - 436
- [9] Fully Secure Accountable-Authority Identity-Based Encryption [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 296 - 316