{"categories":["crypt"],"blog_url":"https://186.hatenablog.com/","author_name":"smoking186","type":"rich","published":"2009-08-30 15:42:05","url":"https://186.hatenablog.com/entry/20090830/1251614525","author_url":"https://blog.hatena.ne.jp/smoking186/","width":"100%","provider_name":"Hatena Blog","blog_title":"186 @ hatenablog","description":"Introduction to Identity-Based Encryption (Information Security and Privacy Series)\u4f5c\u8005: Luther Martin\u51fa\u7248\u793e/\u30e1\u30fc\u30ab\u30fc: Artech House\u767a\u58f2\u65e5: 2008/01\u30e1\u30c7\u30a3\u30a2: \u30cf\u30fc\u30c9\u30ab\u30d0\u30fc \u30af\u30ea\u30c3\u30af: 14\u56de\u3053\u306e\u5546\u54c1\u3092\u542b\u3080\u30d6\u30ed\u30b0\u3092\u898b\u308b Voltage\u306eLuther Martin\u304c\u66f8\u3044\u305f\u672c. Cocks, Boneh-Franklin, Waters, Sakai-Kasahara\u306e\u7d39\u4ecb\u3092\u3057\u3066\u3044\u308b. \u6955\u5186\u66f2\u7dda\u306e\u8a71\u306b\u3082\u89e6\u308c\u3066\u304a\u308a, \u5352\u8ad6\u3067\u4f7f\u3046\u3068\u304b, \u9662\u751f\u5411\u3051\u306e\u6388\u696d\u306b\u4e01\u5ea6\u826f\u3044\u3093\u3058\u3083\u306a\u3044\u3067\u3057\u3087\u3046\u304b.\u2026","image_url":"http://ecx.images-amazon.com/images/I/415PMiCmkqL.jpg","provider_url":"https://hatena.blog","version":"1.0","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20090830%2F1251614525\" title=\" ID\u30d9\u30fc\u30b9\u6697\u53f7 - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","title":" ID\u30d9\u30fc\u30b9\u6697\u53f7","height":"190"}