Attribute-Based Encryption : Using Identity-Based Encryption for Access Control
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] Blake Ramsdell. S/MIME Version 3 Certificate Handling , 1999, RFC.
[6] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[7] John Linn,et al. Attribute certification: an enabling technology for delegation and role-based controls in distributed environments , 1999, RBAC '99.