[1] Fiat A, Naor M. Broadcast encryption [C]// Advances in Cryptology CRYPTO'93. Berlin, Germany: Springer-Verlag, 1993: 480-491.[2] Zhang Y L, Zhang Y K, Zhang J. An ID-based broadcast encryption scheme for collaborative design [C]// International Conference on Networks Security, Wireless Communications and Trusted Computing. Wuhan, China: IEEE Computer Society, 2009:699-702.[3] Delerablee C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys [C]// Proceedings of the First International Conference on Pairing-Based Cryptography. Heidelberg, Germany: Springer-Verlag, 2007: 39-59.[4] Hu L, Liu Z L, Cheng X H. Efficient identity-based broadcast encryption without random oracles [J]. Journal of Computers, 2010, 5 (3): 331-336.[5] Yu G, Ma X, Shen Y, et al. Provable secure identity based generalized signcryption scheme [J]. Theoretical Computer Science, 2010, 411 (42): 3614-3624.[6] Zhang L Y, Hu Y P, Mu N B. An identity-based broadcast encryption protocolfor Ad Hoc networks [C]// Proceedings of the 9th InternationalConference for Young Computer Scientists. Changsha, China: IEEEComputer Society, 2008: 1619-1623.[7] Liu Z H, Hu Y P, Ma H. Secure proxy multi-signature scheme in thestandard model [C]// Proceedings of the Second International Conference. Berlin, Germany: Springer-Verlag, 2008: 124-140.[8] Waters B. Efficient identity based encryption without random oracles[C]// Advances in Cryptology Eurocrypt 2005. Berlin, Germany: Springer-Verlag, 2005: 114-127.[9] Barbosa M, Farshim P. Efficient identity- based key encapsulation tomultiple parties [C]// Cryptography and Coding. Berlin, Germany: Springer-Verlag, 2005: 428-441.[10] Park J H, Lee D H. Security analysis of a multi-receiver identity-basedkey encapsulation mechanism [J]. IEICE Transactions onFundamentals, 2009, E92-A (1): 329-331.[11] Chen L, Malone Lee J. Improved identity-basedsigncryption [C]// Proceedings of the Eighth InternationalWorkshop on Theory and Practice in Public Key Cryptography. Berlin,Germany: Springer-Verlag, 2005: 362-379.[12] Boneh D, Franklin M. Identity-based encryption form the Weil pairing[C]// Advances in Cryptology-CRYPTO'2001. Berlin, Germany: Springer-Verlag, 2001: 213-229. |