[1] |
SHAMIR A,BLAKLEY G,CHAUM D.Identity-based Cryptosystem and Signature Schemes[J]. Lecture Notes in Computer Science, 1984, 21(2):47-53.
|
[2] |
BONEH D, FRANKLIN M.Identity-based Encryption from the Weil Pairing[J]. ACM. Society for Industrial and Applied Mathematics , 2003 , 32(3) :213-229.
|
[3] |
BONEH D, BOYEN X.Efficient Selective-ID Secure Identity Based Encryption without Random Oracles[C] //AMS.International Conference on the Theory and Applications of Cryptographic Techniques, May 11-15,2004, Copenhagen, Denmark. Berlin: Springer-Verlag, 2004:223-238.
|
[4] |
CANETTI R, HALEVI S, KATZ J.A Forward-secure Public-key Encryption Scheme[J]. Journal of Cryptology, 2007, 20(3):265-294.
|
[5] |
WATERS B,CRAMER R.Efficient Identity-based Encryption Without Random Oracles[C]// ACM.EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Berlin: Springer-Verlag, 2005:114-127.
|
[6] |
GENTRY C.Practical Identity-based Encryption without Random Oracles[C]//Springer. EUROCRYPT'06 Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 28-June 1, 2006, St.Pertersbury,Russia. Berlin: Springer-Verlag, 2006:445-464.
|
[7] |
LI Shundong,YANG Kunwei,GONG Linming,et al.A Publicly Verifiable Anonymous IBE Scheme in the Standard Model[J]. Acta Electronica Sinica, 2016,44(3):673-678.
|
|
李顺东, 杨坤伟, 巩林明.标准模型下可公开验证的匿名IBE方案[J]. 电子学报, 2016,44(3):673-678.
|
[8] |
JI Haiping, XU Lei, YU Xiaoling, et al.Research on Hierarchical Identity-based Encryption Management System in Cloud Computing[J]. Netinfo Security,2016(5):30-36.
|
|
计海萍,徐磊,蔚晓玲,等. 云计算环境下基于身份的分层加密管理系统研究[J]. 信息网络安全,2016(5):30-36.
|
[9] |
XU Guoyu, CHEN Xingyuan, DU Xuehui.An Authentication Scheme Using Hierarchical Identity Based Signature in Large-scale Delay Tolerant Networks[J]. Journal of Electronics & Information Technology, 2013, 35(11):2615-2622.
|
|
徐国愚, 陈性元, 杜学绘. 大规模延迟容忍网络中基于分级身份签名的认证方案研究[J].电子与信息学报,2013, 35(11):2615-2622.
|
[10] |
CHEN Yameng, CHENG Xiangguo, WANG Shuo, et al.Research on Certificateless Group Signature Scheme Based on Bilinear Pairings[J]. Netinfo Security,2017(3):53-58.
|
|
陈亚萌, 程相国, 王硕, 等. 基于双线性对的无证书群签名方案研究[J]. 信息网络安全,2017(3):53-58.
|
[11] |
KATZ J, YEHUDA L.Introduction to Modern Cryptography[M]. Florida: CRC-Press Inc, 2015.
|
[12] |
LIU Jingang, DONG Junwu.Research on Identity-based Encryptions from Large Integer Factorization[J]. Netinfo Security, 2015(10):32-39.
|
|
刘锦刚,董军武. 基于大整数分解的身份加密体制研究[J]. 信息网络安全,2015(10):32-39.
|
[13] |
BOYEN X,WATERS B.Anonymous hierarchical identity-basedencryption without random oracles[C]//Springer. International Conference on Advances in Cryptology, August 20-24, 2006, Santa Barbara, California. Berlin: Springer-Verlag, 2006:290-307.
|
[14] |
ABDALLA M, BELLARE M, CATALANO D, et al.Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions[J]. Journal of Cryptology, 2008, 21(3):350-391.
|
[15] |
XU Lei, XU Chungen, YU Xiaoling.Secure and Efficient Data Retrieval Scheme Using Searchable Encryption in Cloud[J]. Journal of Cryptologic Research, 2016, 3(4): 330-339.
|
|
徐磊,许春根,蔚晓玲. 云存储上高效安全的数据检索方案[J].密码学报,2016,3(4):330-339.
|
[16] |
LIN Muqing.Research on Key Technologies of Distribution and Search for Encrypted Data[D].Shenyang:Northeastern University,2015.
|
|
林慕清. 密文数据的分发与搜索关键技术[D].沈阳:东北大学, 2015.
|
[17] |
XU Lei, XU Chungen, DOU Bennian.Identity-based Encryption from the Asymmetric Bilinear Pairings[J]. Communications Technology, 2014, 47(8):941-945.
|
|
徐磊, 许春根, 窦本年. 非对称双线性对下的基于身份的加密方案[J]. 通信技术, 2014, 47(8):941-945.
|
[18] |
YANG Kunwei, LI Shundong.Anonymous Identity-based Encryption without Random Oracles[J]. Computer Science, 2015,42(6):171-174.
|
|
杨坤伟, 李顺东. 一个标准模型下的匿名的IBE方案[J]. 计算机科学, 2015,42(6):171-174.
|