[1] SHAMIR A. Identity-based cryptosystems and signature schemes [C]//Proceedings of CRYPTO '84 on Advances in Cryptology. Berlin: Springer, 1984:47-53. [2] BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [J]. SIAM Journal of Computing, 2001,32(3):586-615. [3] WARTERS B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions [M]//HALEVI S. Advances in Cryptology-CRYPTO 2009, LNCS 5677. Berlin: Springer, 2009:619-636. [4] HORWITZ J, LYNN B. Toward hierarchical identity-based encryption [EB/OL]. [2015-02-04]. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.414.2568&rep=rep1&type=pdf. [5] BONEH D, BOYEN X, GOH E-J. Hierarchical identity based encryption with constant size ciphertext [M]//CRAMER R. Advances in Cryptology-EUROCRYPT 2005, LNCS 3494. Berlin: Springer, 2005:440-456. [6] GENTRY C, HALEVI S. Hierarchical identity based encryption with polynomially many levels [M]//REINGOLD O. Theory of Cryptography, LNCS 5444. Berlin: Springer, 2009:437-456. [7] LEWKO A, WARTERS B. New techniques for dual system encryption: and fully secure HIBE with short ciphertexts [M]//MICCIANCIO D. Theory of Cryptography, LNCS 5978. Berlin: Springer, 2010:455-479. [8] EVEN S, GOLDREICH O, MICALI S. Online/off-line digital signatures [C]//Proceedings on Advances in Cryptology. New York: Springer, 1989:263-275. [9] GUO F, MU Y, CHEN Z. Identity-based online/offline encryption [M]//TSUDIK G. Financial Cryptography and Data Security, LNCS 5143. Berlin: Springer, 2008:247-261. [10] CHOW S S M, LIU J K, ZHOU J. Identity-based online/offline key encapsulation and encryption [EB/OL]. [2015-01-11]. http://eprint.iacr.org/2010/194.pdf. [11] LIU J K, ZHOU J. An efficient identity-based online/offline encryption scheme [M]//ABDALLA M, POINTCHEVAL D, FOUQUE P-A, et al. Applied Cryptography and Network Security, LNCS 5536. Berlin: Springer, 2009:156-167. [12] WANG Z, LI J, MA H, et al. Fully secure identity-based online/offline encryption [J]. Journal of Computer Applications, 2014,34(12):3458-3461.(王占君,李杰,马海英,等. 完全安全的身份基在线/离线加密[J].计算机应用,2014,34(12):3458-3461.) [13] MA H, ZENG G, WANG Z, et al. Efficient and provably secure attribute-based online/offline encryption schemes [J]. Journal on Communications, 2014,35(7):104-112.(马海英,曾国荪,王占君,等.高效可证明安全的基于属性的在线/离线加密机制[J].通信学报,2014,35(7):104-112.) [14] HOHENBERGER S, WATERS B. Online/offline attribute-based encryption [M]//KRAWCZYK H. Public-Key Cryptography-PKC 2014, LNCS 8383. Berlin: Springer, 2014:293-310. [15] ZHAO J, ZHAO X, SHI Y. Certificateless signcryption with online/offline technique [J]. Journal of Computer Applications, 2014,34(9):2659-2663.(赵晶晶,赵雪霞,石岳蓉.结合在线/离线方法的无证书签密[J].计算机应用,2014,34(9):2659-2663.) [16] YANG X, LI C, XU T, et al. ID-based on-line/off-line threshold signature scheme without bilinear pairing [J]. Journal on Communications, 2013,34(8):185-190.(杨小东,李春梅,徐婷,等. 无双线性对的基于身份的在线/离线门限签名方案[J].通信学报,2013,34(8):185-190.) [17] WANG L. Online/offline digital signature algorithm in wireless networks [J]. Journal of Guilin University of Technology, 2013,33(2):339-344.(王林.无线网络中的一种在线/离线数字签名算法[J].桂林理工大学学报,2013,33(2):339-344.) |