[1] Fiat A, Naor M. Broadcast encryption [C]// Advances in Cryptology CRYPTO'93. Berlin, Germany: Springer-Verlag, 1993: 480-491.
[2] Zhang Y L, Zhang Y K, Zhang J. An ID-based broadcast encryption scheme for collaborative design [C]// International Conference on Networks Security, Wireless Communications and Trusted Computing. Wuhan, China: IEEE Computer Society, 2009:
699-702.
[3] Delerablee C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys [C]// Proceedings of the First International Conference on Pairing-Based Cryptography. Heidelberg, Germany: Springer-Verlag, 2007: 39-59.
[4] Hu L, Liu Z L, Cheng X H. Efficient identity-based broadcast encryption without random oracles [J]. Journal of Computers, 2010, 5 (3): 331-336.
[5] Yu G, Ma X, Shen Y, et al. Provable secure identity based generalized signcryption scheme [J]. Theoretical Computer Science, 2010, 411 (42): 3614-3624.
[6] Zhang L Y, Hu Y P, Mu N B. An identity-based broadcast encryption protocol
for Ad Hoc networks [C]// Proceedings of the 9th International
Conference for Young Computer Scientists. Changsha, China: IEEE
Computer Society, 2008: 1619-1623.
[7] Liu Z H, Hu Y P, Ma H. Secure proxy multi-signature scheme in the
standard model [C]// Proceedings of the Second International Conference. Berlin, Germany: Springer-Verlag, 2008: 124-140.
[8] Waters B. Efficient identity based encryption without random oracles
[C]// Advances in Cryptology Eurocrypt 2005. Berlin, Germany: Springer-Verlag, 2005: 114-127.
[9] Barbosa M, Farshim P. Efficient identity- based key encapsulation to
multiple parties [C]// Cryptography and Coding. Berlin, Germany: Springer-Verlag, 2005: 428-441.
[10] Park J H, Lee D H. Security analysis of a multi-receiver identity-based
key encapsulation mechanism [J]. IEICE Transactions on
Fundamentals, 2009, E92-A (1): 329-331.
[11] Chen L, Malone Lee J. Improved identity-based
signcryption [C]// Proceedings of the Eighth International
Workshop on Theory and Practice in Public Key Cryptography. Berlin,
Germany: Springer-Verlag, 2005: 362-379.
[12] Boneh D, Franklin M. Identity-based encryption form the Weil pairing
[C]// Advances in Cryptology-CRYPTO'2001. Berlin, Germany: Springer-Verlag, 2001: 213-229. |