Author:
Jia Hongyong,Chen Yue,Lan Julong,Huang Kaixiang,Wang Jun
Funder
National Basic Research Program of China (973 Program)
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference16 articles.
1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology—Crypto 1984. Lecture Notes in Computer Science, vol. 196, pp. 47–53, Springer, Berlin (1984)
2. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology—CRYPTO 2001, pp. 213–229. Springer, Berlin (2001)
3. Li, J., Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. (2015). doi: 10.1109/TC.2013.208
4. Lim, H.W., Paterson, K.G.: Identity-based cryptography for grid security. In: Proceedings of the e-Science, pp. 395–404 (2005)
5. Su, L., Lim, H.W., Ling, S., et al.: Revocable IBE systems with almost constant-size key update. In: International Conference on Pairing-Based Cryptography Pairing 2013, pp. 168–185. Springer, Berlin (2014)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献