[1] FIAT A, NAOR M. Broadcast encryption [C]//CRYPTO 1993: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer, 1993: 480-491. [2] DODIS Y, FAZIO N. Public key broadcast encryption secure against adaptive chosen ciphertext attacks [C]//Proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptography. Berlin: Springer, 2003: 100-115. [3] BONEH D, GENTRY C, WATERS B. Collusion resistant broadcast encryption with short ciphertexts and private keys [C]//CRYPTO 2005: Proceedings of the 25th Annual International Cryptology Conference on Advances in Cryptology, LNCS 3621. Berlin: Springer, 2005: 258-275. [4] DELERABLÉE C, PAILLIER P, POINTCHEVAL D. Fully collusion secure dynamic broadcast encryption with constant size ciphertexts or decryption keys [C]//Proceedings of the 1st International Conference on Pairing-Based Cryptography, LNCS 4575. Berlin: Springer, 2007: 39-59. [5] SUN J, HU Y, ZHANG L. A key-policy attribute-based broadcast encryption [J]. International Arab Journal of Information Technology, 2013, 10(5): 444-452. [6] SHAMIR A. Identity-based cryptosystems and signature schemes [C]//Proceedings of CRYPTO 1984 on Advances in Cryptology, LNCS 196. Berlin: Springer, 1984: 47-53. [7] DELERABLÉE C. Identity-based broadcast encryption with constant size ciphertexts and private keys [C]//Proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security on Advances in Cryptology, LNCS 4833. Berlin: Springer, 2007: 200-215. [8] GENTRY C, WATERS B. Adaptive security in broadcast encryption systems [EB/OL]. [2015-11-23]. http://eprint.iacr.org/2008/268.pdf. [9] REN Y, GU D. Fully CCA2 secure identity based broadcast encryption without random oracles [J]. Information Processing Letters, 2009, 109(11): 527-533. [10] LEWKO A, WATERS B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts [C]//TCC 2010: Proceedings of the 7th International Conference on Theory of Cryptography. Berlin: Springer, 2010: 455-479. [11] ZHANG L Y, HU Y P, WU Q. Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups [J]. Mathematical and Computer Modelling, 2012, 55(1/2): 12-18. [12] BELLARE M, BOLDYREVA A, DESAI A, et al. Key-privacy in public key encryption [C]//Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security on Advances in Cryptology, LNCS 2248. Berlin: Springer, 2001: 566-582. [13] BARTH A, BONEH D, WATERS B. Privacy in encrypted content distribution using private broadcast encryption [C]//Proceedings of the 10th International Conference on Financial Cryptography and Data Security, LNCS 4107. Berlin: Springer, 2006: 52-64. [14] KRZYWIECKI L, KUBIAK P, KUTYLOWSKI M. A revocation scheme preserving privacy [C]//Proceedings of the 2nd SKLOIS Conference on Information Security and Cryptology, LNCS 4318. Berlin: Springer, 2006: 130-143. [15] JARECKI S, LIU X. Unlinkable secret handshakes and key-private group key management schemes [C]//Proceedings of the 5th International Conference on Applied Cryptography and Network Security, LNCS 4521. Berlin: Springer, 2007: 270-287. [16] YU S, REN K, LOU W. Attribute-based on-demand multicast group setup with membership anonymity [J]. Computer Networks, 2010, 54(3): 377-386. [17] LIBERT B, PATERSON K G, QUAQLIA E A. Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model [C]//PKC 2012: Proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography. Berlin: Springer, 2012: 206-224. [18] ZHANG L, WU Q, MU Y. Anonymous identity-based broadcast encryption with adaptive security [C]//Proceedings of the 5th International Symposium on Cyberspace Safety and Security, LNCS 8300. Berlin: Springer, 2013: 258-271. [19] 杨坤伟, 李顺东.一种基于身份的匿名广播加密方案[J]. 计算机工程, 2014, 40(7):97-101.(YANG K W, LI S D. An anonymous identity-based broadcast encryption scheme [J]. Journal of Computer Engineering, 2014, 40(7): 97-101.) [20] BONEH D, GOH E, NISSIM K. Evaluating 2-DNF formulas on ciphertexts [C]//Proceedings of the 2nd Theory of Cryptography Conference, LNCS 3378. Berlin: Springer, 2005: 325-341. [21] WATERS B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions [C]//Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, LNCS 5677. Berlin: Springer, 2009: 619-636. |