[1]Fiat A, Naor M. Broadcast encryption[C]∥Advances in CryptologyCrypto’93. California, USA: Springer Berlin Heidelberg, 1994: 480491.
[2]Sun J, Hu Y P, Zhang L Y. Chosenciphertext secure identitybased broadcast encryption in the standard model [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16(6): 672676.
[3]Delerablée C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constantsize ciphertexts or decryption keys [C]∥Pairing 2007. Tokyo, Japan: Springer Berlin Heidelberg, 2007: 3959.
[4]Hu L, Liu Z L,Cheng X H. Efficient identitybased broadcast encryption without random oracles [J].Journal of Computers, 2010, 5(3): 331336.
[5]Yu G, Ma X, Shen Y, et al. Provable secure identity based generalized signcryption scheme[J]. Theoretical Computer Science, 2010, 411(40): 36143624.
[6]Zhang L Y, Hu Y P, Mu N B. An identitybased broadcast encryption protocol for ad hoc networks [C]∥Young Computer Scientists. Hunan, China: IEEE, 2008: 16191623.
[7]Boneh D, Waters B. Conjunctive, subset and range queries on encrypted data[C]∥TCC 2007. Amsterdam, The Netherlands: Springer Berlin Heidelberg, 2007: 535554.
[8]Gentry C. Practical identitybased encryption without random oracles[C]∥Advances in CryptologyEUROCRYPT 2006. Petersburg, Russia: Springer, 2006: 445464.
[9]Shi E, Waters B. Delegating capabilities in predicate encryption systems[C]∥ICALP 2008. Reykjavik, Iceland: Springer Berlin Heidelberg, 2008: 560578.
[10]Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions[C]∥Advances in CryptologyCRYPTO 2009. Santa Barbara, CA, USA: Springer Berlin Heidelberg, 2009: 619636.
[11]Seo J H, Kobayashi T, Ohkubo M,et al. Anonymous hierarchical identitybased encryption with constant size ciphertext[C]∥International Association for Cryptologic Research 2009. CA, USA: Springer Berlin Heidelberg, 2009: 215234.
[12]Boneh D, Goh E, Nissim K. Evaluating 2dnf formulas on ciphertexts[C]∥Theory of Cryptography. Cambridge, MA, USA: Springer Berlin Heidelberg, 2005: 325342.
[13]Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products[C]∥
Advances in CryptologyEUROCRYPT 2008. Istanbul, Turkey: Springer Berlin Heidelberg, 2008: 146162. |