Fiat A and Naor M. Broadcast encryption [C]. CRYPTO93, 1993, LNCS 773: 480-491.[2] Zhang Y L, Zhang Y K, and Zhang J. An ID-based broadcast encryption scheme for collaborative design [C]. International Conference on Networks Security, Wireless Communications and Trusted Computing, IEEE Computer Society, 2009, NSWCTC, Vol.346: 699-702.[3] Delerable C, Paillier P, and Pointcheval D. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys [C]. 2007, LNCS 4575: 39-59. [4] Sharmila D S S, Sree V S, and Ragavendran G, et al.Cryptanalysis of ID-based signcryption scheme for multiple receivers[R]. Cryptology ePrint Archive, Report 2008/238, 2008. [5] Zhang L Y, Hu Y P, and Mu N B. Identity-based broadcast encryption protocol for Ad hoc networks[C]. The 9th International Conference for Young Computer Scientists, IEEE Computer Society, 2009, ICYCS, Vol.194: 1619-1623.[6] Shamir A. Identity-based cryptosyetems and signature schemes[C]. CRYPTO 1984, 1984, LNCS 196: 47-53.[7] Waters B. Efficient identity based encryption without random oracles[C]. EUROCRYPT 2005, LNCS 3494: 114-127.[8] Baek J, Safavi-Naini R, and Susilo W. Efficient multi-receiver identity-based encryption and its application to broadcast encryption [C]. PKC 2005, LNCS 3386: 380-397.[9] Barbosa M and Farshim P. Efficient identity-based key encapsulation to multiple parties [C]. Cryptography and Coding, 10th IMA International Conference Cirencester, 2005, LNCS 3796: 428-441.[10] Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions[C]. Advances in Cryptology-CRYPTO 2009, LNCS 5677: 619-636. [11] Boneh D, Boyen X, and Goh E. Hierarchical identity based encryption with constant size ciphertext[C]. Advances in Cryptology-EUROCRYPT 2005, LNCS 3493: 440-456.[12] Boneh D, Goh E, and Nissim K. Evaluating 2-dnf formulas on ciphertexts[C]. Theory of Cryptography, 2005, LNCS 3378: 325-342.[13] Katz J, Sahai A, and Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products[C]. Advances in Cryptology-EUROCRYPT 2008, 2008, LNCS 4965: 146-162.
|