[1] |
SHAMIR A.Identity-based Cryptosystems and Signature Schemes[C]//Springer. CRYPTO 84, August 19-22, 1984, Santa Barbara, California, USA. Berlin, Heidelberg: Springer, 1984: 47-53.
|
[2] |
BONEH D, FRANKLIN M.Identity-based Encryption from the Weil Pairing[C]//Springer. 21st Annual International Cryptology Conference, August 19-23, 2001, Santa Barbara, California, USA. Berlin, Heidelberg: Springer, 2001: 213-229.
|
[3] |
GENTRY C and SILVERBERG A. Hierarchical Id-based Cryptography[C]//Springer. 8th International Conference on the Theory and Application of Cryptology and Information Security, December 1-5, 2002, Queenstown, New Zealand. Berlin, Heidelberg: Springer, 2002: 548-566.
|
[4] |
HORWITZ J and LYNN B. Toward Hierarchical Identity-based Encryption[C]//Springer. International Conference on the Theory and Applications of Cryptographic Techniques, April 28-May 2, 2002, Amsterdam, The Netherlands. Berlin, Heidelberg: Springer, 2002: 466-481.
|
[5] |
BOYEN X, WATERS B.Anonymous Hierarchical Identity-based Encryption(without Random Oracles)[C]//Springer. 26th Annual International Cryptology Conference, August 20-24, 2006, Santa Barbara, California, USA. Berlin, Heidelberg: Springer, 2006: 290-307.
|
[6] |
SEOJ H., KOBAYASHI T, OHKUBO M, et al. Anonymous Hierarchical Identity-based Encryption with Constant Size Ciphertexts[C]//Springer. 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, March 18-20, 2009, CA, USA. Berlin, Heidelberg: Springer, 2009: 215-234.
|
[7] |
GENTRYC. Fully Homomorphic Encryption Using Ideal Lattices[C]//ACM. 41st ACM Symposium on Theory of Computing, May 31-June 2, 2009, Bethesda, MD, USA. New York, NY, USA: ACM, 2009: 169-178.
|
[8] |
AGRAWAL S, BONEH D, BOYEN X. EfficientLattice(H)IBE in the Standard Model[C]//Springer.29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30-June 3, 2010, French Riviera. Berlin, Heidelberg: Springer, 2010: 553-572.
|
[9] |
SINGH K, RANGAN C P, BANERJEE A K.Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters[J]. Information and Communication, 2014, 84(7): 542-553.
|
[10] |
SEOJ H, EMURAK. Efficient Delegation of Key Generation and Revocation Functionalities in Identity-based Encryption[C]//Springer. The Cryptographers’ Track at the RSA Conference, February 25-March 1, 2013, San Francisco, CA, USA. Berlin, Heidelberg: Springer, 2013: 343-358.
|
[11] |
LEE K, PARK S.Revocable Hierarchical Identity-based Encryption with Shorter Private Keys and Update Keys[J]. Designs, Codes and Cryptography, 2018, 86(10): 2407-2440.
|
[12] |
SEO J H, EMURA K.Revocable Hierarchical Identity-based Encryption: History-free Update, Security against Insiders, and Short Ciphertexts[C]//Springer. CT-RSA 2015, April 20-24, 2015, San Francisco, California, USA. Berlin, Heidelberg: Springer, 2015: 106-123.
|
[13] |
SUSILO W and MU Y. Hierarchical Identity-Based Broadcast Encryption[C]//Springer. 19th Australasian Conference, July 7-9, 2014, Wollongong, NSW, Australia. Berlin, Heidelberg: Springer, 2014: 242-257.
|
[14] |
BLAZY O, KILTZ E, PAN J.(Hierarchical) Identity-based Encryption from Affine Message Authentication[C]//Springer. 34th Annual Cryptology Conference, August 17-21, 2014, Santa Barbara, CA, USA. Berlin, Heidelberg: Springer, 2014: 408-425.
|
[15] |
JOUX A.A One Round Protocol for Tripartite Diffie-Hellman, in Algorithmic Number Theory(ANTS-IV)[C]//Springer. 4th International Algorithmic Number Theory Symposium, July 2-7, 2000, The Netherlands. Berlin, Heidelberg: Springer, 2000: 385-394.
|
[16] |
WATERS B.Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions[C]//Springer. 29th Annual International Cryptology Conference, August 16-20, 2009, Santa Barbara, CA, USA. Berlin, Heidelberg: Springer, 2009: 619-636.
|
[17] |
WEE H.Déjà Q: Encore!Un Petit IBE[C]//Springer. 13th International Conference, TCC 2016-A, January 10-13, 2016, Tel Aviv, Israel. Berlin, Heidelberg: Springer, 2016: 237-258.
|
[18] |
LEWKO A, WATERS B.New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts[C]//Springer. 7th Theory of Cryptography Conference, February 9-11, 2010, Zurich, Switzerland. Berlin, Heidelberg: Springer, 2010: 455-479.
|
[19] |
BONEH D, GOH E, NISSIM K.Evaluating 2-DNF Formulas on Ciphertexts[C]//Springer. Second Theory of Cryptography Conference, February 10-12, 2005, Cambridge, MA, USA. Berlin, Heidelberg: Springer, 2005: 325-341.
|
[20] |
WATERS B.Efficient Identity-based Encryption without Random Oracles[C]//Springer. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Berlin, Heidelberg: Springer, 2005: 114-127.
|
[21] |
YANG Bo.The Provable Security of Cryptography[M]. Beijing: Tsinghua University Press, 2017: 36-38.
|
|
杨波. 密码学中的可证明安全性[M]. 北京:清华大学出版社,2017:36-38.
|
[22] |
RAMANNASC, SARKARP. Efficient(Anonymous) Compact HIBE from Standard Assumptions[C]//Springer. 8th International Conference on Provable Security, October 9-10, 2014, Hong Kong, China. Berlin, Heidelberg: Springer, 2014: 243-258.
|
[23] |
SEO J H, KOBAYASHI T, OHKUBO M, et al.Anonymous Hierarchical Identity-based Encryption with Constant Size Ciphertexts[C]//Springer. 12th International Conference on Practice and Theory in Public Key Cryptography, March 18-20, 2009, Irvine, CA, USA. Berlin, Heidelberg: Springer, 2009: 215-234.
|
[24] |
CARO D A, IOVINO V, PERSIANO G.Fully Secure Anonymous HIBE and Secret-key Anonymous IBE with Short Ciphertexts.[C]//Springer. 4th International Conference on Pairing-Based Cryptography, December 13-15, 2010, Yamanaka Hot Spring, Japan. Berlin, Heidelberg: Springer, 2010: 347-366.
|