Funder
Ministry of Science, ICT and Future Planning
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference43 articles.
1. Aiello W., Lodha S., Ostrovsky R.: Fast digital identity revocation (extended abstract). In: Krawczyk H. (ed.) CRYPTO ’98. Lecture Notes in Computer Science, vol 1462, pp. 137–152. Springer, Heidelberg (1998).
2. Attrapadung N., Imai H.: Conjunctive broadcast and attribute-based encryption. In: Shacham H., Waters B. (eds.) Pairing 2009. Lecture Notes in Computer Science, vol. 5671, pp. 248–265. Springer, Heidelberg (2009).
3. Bethencourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society, Washington, DC (2007).
4. Boldyreva A., Goyal V., Kumar V.: Identity-based encryption with efficient revocation. In: Ning P., Syverson P.F., Jha S. (eds.) ACM Conference on Computer and Communications Security, pp. 417–426. ACM, New York (2008).
5. Boneh D., Boyen X.: Efficient selective-id secure identity-based encryption without random oracles. In: Cachin C., Camenisch J. (eds.) EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 223–238. Springer, Heidelberg (2004).
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献