Author:
Zhang Lei,Wu Qianhong,Domingo-Ferrer Josep,Qin Bo,Zeng Peng
Funder
NSF of China
National Key Basic Research Program (973 program)
Shanghai NSF
Shanghai Chen Guang Program (12CG24)
Beijing Natural Science Foundation
EU FP7
Spanish Government
Government of Catalonia
Research Fund for the Doctoral Program of Higher Education of China
Fundamental Research Funds for the Central Universities of China
Open Project of Shanghai Key Laboratory of Trustworthy Computing
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference32 articles.
1. S. Al-Riyami, K. Paterson, Certificateless public key cryptography, in: ASIACRYPT 2003, LNCS 2894, 2003, pp. 452–473.
2. M. Au, J. Chen, J. Liu, Y. Mu, D. Wong, G. Yang, Malicious KGC attacks in certificateless cryptography, in: ACM ASIACCS, 2007, pp. 302–311.
3. M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in: ACM CCS 1993, 1993, pp. 62–73.
4. A. Boldyreva, V. Goyal, V. Kumar, Identity-based encryption with efficient revocation, in: ACM CCS 2008, 2008, pp. 417–426.
5. D. Boneh, X. Boyen, E. Goh, Hierarchical identity based encryption with constant size ciphertext, in: EUROCRYPT 2005, LNCS 3494, 2005, pp. 440–456.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献