共 50 条
- [1] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
- [2] Identity-based encryption and hierarchical identity-based encryption [J]. Cryptology Inf. Secur. Ser., 2009, (45-64):
- [3] Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV, 2021, 12828 : 239 - 269
- [4] Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 257 - 274
- [5] Anonymous Identity-Based Encryption with Bounded Leakage Resilience [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 287 - 292
- [6] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
- [7] Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 461 - 478
- [9] Idealizing Identity-Based Encryption [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 495 - 520
- [10] Fuzzy identity-based encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473