Author:
Kasamatsu Kohei,Matsuda Takahiro,Emura Keita,Attrapadung Nuttapong,Hanaoka Goichiro,Imai Hideki
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Anderson, R.: Two remarks on public key cryptology. Invited Lecture, ACM CCS 1997 (1997),
http://www.cyphernet.org/cyphernomicon/chapter14/14.5.html
2. Lecture Notes in Computer Science;N. Attrapadung,2005
3. Lecture Notes in Computer Science;D. Boneh,2005
4. Boneh, D., Boyen, X., Goh, E.J.: Hierarchical identity based encryption with constant size ciphertext. Full version of [3]. Cryptology ePrint Archive: Report 2005/015 (2005)
5. Lecture Notes in Computer Science;D. Boneh,2001
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献