共 50 条
- [31] Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 384 - 402
- [32] Expressive CP-ABE Scheme for Mobile Devices in loT Satisfying Constant-Size Keys and Ciphertexts IEEE ACCESS, 2017, 5 : 3273 - 3283
- [33] Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsorced Verifiable Computation ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 269 - 279
- [34] Fully collusion resistant traitor tracing with short ciphertexts and private keys ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 573 - 592
- [35] Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
- [37] Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption INFORMATION SYSTEMS SECURITY, 2016, 10063 : 193 - 211
- [38] Fully collusion resistant black-box traitor revocable broadcast encryption with short private keys AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2007, 4596 : 496 - 508
- [39] CCA2-secure threshold broadcast encryption with shorter ciphertexts PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 35 - +
- [40] CCA2 secure biometric identity based encryption with constant-size ciphertext Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827