Author:
Zhang Leyou,Hu Yupu,Tian Xu’an,Yang Yang
Publisher
Springer Science and Business Media LLC
Reference16 articles.
1. Desmedt Y, Frankel Y. Threshold cryptosystems[C] //Proceedings of Crypto 1989. Berlin: Springer-Verlag, 1989: 307–315.
2. Shamir A. Identity-based cryptosystems and signature schemes[C]//Proceedings of Crypto 1984. Berlin: Springer-Verlag, 1984: 47–53.
3. Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of Crypto2001. Berlin: Springer-Verlag, 2001: 213–229.
4. Boneh D, Boyen X. Efficient selective-ID secure identity based encryption without random oracles[C]// Proceedings of Crypto 2004. Berlin: Springer-Verlag, 2004: 223–238.
5. Cocks C. An identity based encryption scheme based on quadratic residues[C]// Proceedings of Cryptography and coding. Berlin: Springer-Verlag, 2001: 360–363.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献