[1]Dodis Y, Katz J, Xu S, et al. Keyinsulated publickey cryptosystem [C]//Proceedings of EUROCRYPT’02: LNCS 2332. Berlin: SpringerVerlag, 2002: 6582. [2]Hanaoka Y, Hanaoka G, Shikata J, et al. Identitybased hierarchical strongly keyinsulated encryption and its application [C]//Proceedings of ASIACRYPT’05: LNCS 3788. Berlin: SpringerVerlag, 2006: 105122. [3]Weng J, Chen K, Liu S, et al. Identitybased strong keyinsulated signature without random oracles [J]. Journal of Software, 2008, 19(6): 15551564. [4]Weng J, Chen K, Li X, et al. Identitybased threshold keyinsulated encryption without random oracles[C]//Proceedings of CTRSA’08: LNCS 4964. Berlin: SpringerVerlag, 2008: 203220. [5]Chen J, Chen K, Long Y. Identitybased threshold keyinsulated signature [J]. High Technology Letters, 2012, 18(3): 275280. [6]Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited [J]. Journal of the ACM, 2004, 51(4): 557594. |