共 15 条
- [1] Shamir A., Identity-based cryptosystems and signature schemes, Proceedings of the CRYPTO'84, pp. 48-53, (1985)
- [2] Boneh D., Franklin M., Identity-based encryption from the weil pairing, Proceedings of the Cryptology-Crypto 2001, pp. 229-231, (2001)
- [3] Bellare M., Boldyreva A., Palacio A., An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Proceedings of the Cryptology-EUROENCRYPT'2004, pp. 171-188, (2004)
- [4] Boneh D., Boyen X., Secure identity based encryption without random oracles, Proceedings of the Cryptology-Crypto 2004, pp. 443-459, (2004)
- [5] Boneh D., Boyen X., Efficient selective-ID identity based encryption without random oracles, Proceedings of the Cryptology-EUROENCRYPT'2004, pp. 223-238, (2004)
- [6] Waters B., Efficient identity-based encryption without random oracles, Proceedings of the Cryptology-EUROENCRYPT'2005, pp. 114-127, (2005)
- [7] Gentry C., Practical identity-based encryption without random oracles, Proceedings of the Cryptology-EUROENCRYPT'2006, pp. 445-464, (2006)
- [8] Zhong X., Lu L.-R., Nan X.-H., A project designed by IBE encryption system based on SPK, Microcomputer Information,, 21, 4, pp. 226-227, (2005)
- [9] Chen H.-P., Guan Z., Some questions explained about CPK, Information Security and Communication Privacy, 160, 9, pp. 47-49, (2007)
- [10] Xu P., Cui G.-H., Lei F.-Y., An efficient and provably secure IBE scheme without bilinear map, Journal of Computer Research and Development, 45, 10, pp. 1687-1695, (2008)