共 34 条
- [1] Shamir A., Identity-based cryptosystems and signature schemes, Proceedings of the 4th Annual International Cryptology Conference(CRYPTO 1984), pp. 47-53, (1985)
- [2] Boneh D, Franklin M K., Identity-based encryption from the Weil pairing, Proceedings of the 21st Annual International Cryptology Conference(CRYPTO 2001), pp. 213-229, (2001)
- [3] Hofheinz D, Dingding Jia, Jiaxin Pan, Identity-based encryption tightly secure under chosen-ciphertext attacks, Proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT 2018), pp. 190-220, (2018)
- [4] Tseng Yuh-Min, Tsai Tung-Tso, Huang Sen-Shan, Huang Chung-Peng, Identity-based encryption with cloud revocation authority and its applications, IEEE Transactions on Cloud Computing, 6, 4, pp. 1041-1053, (2018)
- [5] Nishimaki R, Yamakawa T., Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio, Proceedings of the 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography(PKC 2019), pp. 466-495, (2019)
- [6] Delerablee C., Identity-based broadcast encryption with constant size ciphertexts and private keys, Proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT 2007), pp. 200-215, (2007)
- [7] Sakai R, Furukawa J., Identity-based broadcast encryption, IACR Cryptology ePrint Archive, (2007)
- [8] Kim J, Susilo W, Au M H, Seberry J., Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext, IEEE Transactions on Information Forensics and Security, 10, 3, pp. 679-693, (2015)
- [9] Kai He, Jian Weng, Jia-Nan Liu, Et al., Anonymous identity-based broadcast encryption with chosen-ciphertext security, Proceedings of the 11th Asia Conference on Computer and Communications Security(AsiaCCS 2016), pp. 247-255, (2016)
- [10] Aijun Ge, Puwen Wei, Identity-based broadcast encryption with efficient revocation, Proceedings of the 22nd International Conference on Practice and Theory of Public Key Cryptography(PKC 2019), pp. 405-435, (2019)