Author:
Boneh Dan,Boyen Xavier,Goh Eu-Jin
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Lecture Notes in Computer Science;D. Boneh,2004
2. Lecture Notes in Computer Science;D. Boneh,2004
3. Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. Cryptology ePrint Archive, Report 2005/015 (2005)
4. Lecture Notes in Computer Science;D. Boneh,2004
5. Lecture Notes in Computer Science;D. Boneh,2001
Cited by
879 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Decentralized Threshold Signatures With Dynamically Private Accountability;IEEE Transactions on Information Forensics and Security;2024
2. Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting;IEEE Transactions on Information Forensics and Security;2024
3. A Regulatable Mechanism for Transacting Data Assets;IEEE Internet of Things Journal;2023-12-15
4. Optimizing 0-RTT Key Exchange with Full Forward Security;Proceedings of the 2023 on Cloud Computing Security Workshop;2023-11-26
5. Efficient Set Membership Encryption and Applications;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15