[1]Fiat A, Naor M. Broadcast encryption[C]∥Advances in CryptologyCrypto’93. California, USA: Springer Berlin Heidelberg, 1994: 480491. [2]Sun J, Hu Y P, Zhang L Y. Chosenciphertext secure identitybased broadcast encryption in the standard model [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16(6): 672676. [3]Delerablée C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constantsize ciphertexts or decryption keys [C]∥Pairing 2007. Tokyo, Japan: Springer Berlin Heidelberg, 2007: 3959. [4]Hu L, Liu Z L,Cheng X H. Efficient identitybased broadcast encryption without random oracles [J].Journal of Computers, 2010, 5(3): 331336. [5]Yu G, Ma X, Shen Y, et al. Provable secure identity based generalized signcryption scheme[J]. Theoretical Computer Science, 2010, 411(40): 36143624. [6]Zhang L Y, Hu Y P, Mu N B. An identitybased broadcast encryption protocol for ad hoc networks [C]∥Young Computer Scientists. Hunan, China: IEEE, 2008: 16191623. [7]Boneh D, Waters B. Conjunctive, subset and range queries on encrypted data[C]∥TCC 2007. Amsterdam, The Netherlands: Springer Berlin Heidelberg, 2007: 535554. [8]Gentry C. Practical identitybased encryption without random oracles[C]∥Advances in CryptologyEUROCRYPT 2006. Petersburg, Russia: Springer, 2006: 445464. [9]Shi E, Waters B. Delegating capabilities in predicate encryption systems[C]∥ICALP 2008. Reykjavik, Iceland: Springer Berlin Heidelberg, 2008: 560578. [10]Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions[C]∥Advances in CryptologyCRYPTO 2009. Santa Barbara, CA, USA: Springer Berlin Heidelberg, 2009: 619636. [11]Seo J H, Kobayashi T, Ohkubo M,et al. Anonymous hierarchical identitybased encryption with constant size ciphertext[C]∥International Association for Cryptologic Research 2009. CA, USA: Springer Berlin Heidelberg, 2009: 215234. [12]Boneh D, Goh E, Nissim K. Evaluating 2dnf formulas on ciphertexts[C]∥Theory of Cryptography. Cambridge, MA, USA: Springer Berlin Heidelberg, 2005: 325342. [13]Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products[C]∥Advances in CryptologyEUROCRYPT 2008. Istanbul, Turkey: Springer Berlin Heidelberg, 2008: 146162. |