Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 444-446.
Previous Articles Next Articles
CHEN Jian, WANG Xiao-ying, WANG Yong-tao and LI Yao-sen
[1] Sahai A,Waters B.Fuzzy identity based encryption:Advances in Cryptology-Eurocrypt 2005[C]∥LNCS Berlin:Springer-Verlag,2005,4:457-473 [2] Beimel A.Secure schemes for secret sharing and key distribution[D].Haifa:Israel Institute of Technology,1996 [3] Wang Hao,Xu Qiu-liang,Fu Xiu.Two-Party attribute-based key agreement protocol in the standard model[C]∥the 2009 International Symposium on Information Processing(ISIP’09).Finland:Academy Publisher,2009:325-328 [4] Wang Hao,Xu Qiu-liang,Fu Xiu.Revocable attribute-based key agreement protocol without random oracles[J].Journal of Networks,2009,4(8):787-794 [5] 王永涛,宋璟,贺强,等.一个基于属性的密钥协商协议[J].计算机工程,2014,40(2):134-139 [6] 魏江宏,刘文芬,胡学先.全安全的属性基认证密钥协商协议[J].计算机应用,2012,32(1):.38-41 [7] 王永涛,封维端,刘孝男,等.一个消息策略基于属性的密钥协商协议[J].计算机科学,2013,40(9):106-110 [8] Waters B.Ciphertext-policy Attribute-based Encryption:An Expressive,Efficient,and Provably Secure Realization[C]∥PKC,LNCS,vol.6571,Berlin:Springer-Verlag,2011:53-70 [9] Boneh D,Franklin M.Identity based encryption from the Weil pairing:Advances in Cryptology- Crypto 2001[C]∥LNCS,vol.2139,Berlin:Springer-Verlag,2001:231-229 [10] Beimel A.Secure Schemes for Secret Sharing and Key Distribution[D].Israel Institute of Technology,Technion,Haifa,Israel,1996 [11] Chen Li-qun,Cheng Zhao-hui,Smart N P.Identity-based Key Agreement Protocols From Pairings.Cryptology ePrint Archive.http://eprint.iacr.org/2006/199 [12] Bellare M,Rogaway P.Entity authentication and key distribution:Advances in Cryptology-CRYPTO 1993[C]∥LNCS,vol.773,Berlin:Springer-Verlag,1994:232-249 |
No related articles found! |
|