共 50 条
- [2] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
- [5] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
- [6] Subgroup operations in identity based encryption using weil pairing for decentralized networks [J]. International Journal of Network Security, 2019, 21 (06): : 930 - 936
- [8] Efficient Identity-Based Encryption from LWR [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
- [9] Puncturable Identity-Based Encryption from Lattices [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589
- [10] Efficient Identity-based Encryption from Lattice [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 84 - 90