共 13 条
- [1] Fiat A., Naor M., Broadcast encryption, CRYPTO'93, LNCS 773, pp. 480-491, (1993)
- [2] Zhang Y.L., Zhang Y.K., Zhang J., An ID-based broadcast encryption scheme for collaborative design, International Conference on Networks Security, Wireless Communications and Trusted Computing, IEEE Computer Society, 346, pp. 699-702, (2009)
- [3] Delerablee C., Paillier P., Pointcheval D., Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys, LNCS 4575, pp. 39-59, (2007)
- [4] Sharmila D.S.S., Sree V.S., Ragavendran G., Et al., Cryptanalysis of ID-based signcryption scheme for multiple receivers, (2008)
- [5] Zhang L.Y., Hu Y.P., Mu N.B., Identity-based broadcast encryption protocol for Ad hoc networks, The 9th International Conference for Young Computer Scientists, IEEE Computer Society, 194, pp. 1619-1623, (2009)
- [6] Shamir A., Identity-based cryptosyetems and signature schemes, CRYPTO 1984, LNCS 196, pp. 47-53, (1984)
- [7] Waters B., Efficient identity based encryption without random oracles, LNCS 3494, pp. 114-127, (2005)
- [8] Baek J., Safavi-Naini R., Susilo W., Efficient multi-receiver identity-based encryption and its application to broadcast encryption, LNCS 3386, pp. 380-397, (2005)
- [9] Barbosa M., Farshim P., Efficient identity-based key encapsulation to multiple parties, Cryptography and Coding, 10th IMA International Conference Cirencester, LNCS 3796, pp. 428-441, (2005)
- [10] Waters B., Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions, Advances in Cryptology-CRYPTO, LNCS 5677, pp. 619-636, (2009)