2D. Boneh, B. Lynn and H. Shacham. Short signatures from the Weil pairing. Journal of Cryp - tology,2004, pp : of1 - of23. 被引量:1
3T. ELGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transaction on Information Theory, vol. 31 (4) :469 -475,1985. 被引量:1
5[5]Moulin P,Koetter R.Data-hiding codes[C].Proceedmgs of the IEEE.Washington:IEEE Press,2005,93(12):2083-2126 被引量:1
6[7]Potdar V M,Han S,Chang E.A survey of digital image watermarking techniques[C].2005 3rd IEEE International Conference on Industrial Informatics.Perth:IEEE Press,2005:709-716 被引量:1
7[9]Hanaoka Y,Hanaoka G,Shikata J.Identity-Based Hierarchical Strongly Key-Insulated Encryp tion and its Application[J].LectNotes Comput SC,2005,3788:495-514 被引量:1
8[10]Attrapandung N,Cu I Y,CJal Ndo D.Relations Among Notions of Security for Identity Based Encryption Schemes[J].LectNotes Comput SC,2006,3887:130-141 被引量:1