[1]SHAMIR A. Identity-based cryptosystems and signature schemes[C]// Advances in Cryptology-CRYPTO’84, LNCS 196. Berlin: Springer-Verlag, 1984: 47-53.
[2]BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2001, 32(3):586-615.
[3]COCKS C. An identity based encryption scheme based on quadratic residues[C]// Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS 2260. Berlin: Springer-Verlag, 2001: 360-363.
[4]GALINDO D. Boneh-Franklin identity based encryption revisited[C]// Proceedings of the 32nd International Colloquium on Automata, Languages and Programming, LNCS 3580. Berlin: Springer-Verlag, 2005: 791-802.
[5]BONEH D, BOYEN X. Efficient selective-ID secure identity based encryption without random oracles[C]// Proceedings of the Advances in Cryptology-Eurocrypt’04. Berlin: Springer-Verlag, 2004: 223-238.
[6]WATERS B. Efficient identity-based encryption without random oracles[C]// Proceedings of the Advances in Cryptology-Eurocrypt’05. Berlin: Springer-Verlag, 2005: 114-127.
[7]WATERS B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions[C]// Proceedings of the Advances in Cryptology-CRYPTO 2009. Berlin: Springer-Verlag, 2009: 619-636.
[8]CHATTERJEE S, SARKAR P. Trading time for space: towards an efficient IBE scheme with short(er) public parameters in the standard model[C]// Proceedings of the 2005 Information Security and Cryptology. Berlin: Springer-Verlag, 2005: 424-440.
[9]NACCACHE D. Secure and practical identity-based encryption[J]. IET Information Security, 2007, 1(2) : 59-64.
[10]ATTRAPADUNG N, FURUKAWA J, GOMI T, et al. Efficient identity-based encryption with tight security reduction [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007, 90-A(9) :1803-1813.
[11]GUO F, MU Y, CHEN Z. Identity-based online/offline encryption[C]// Proceedings of the 2008 Financial Cryptography and Data Security. Berlin: Springer-Verlag, 2008: 247-261.
[12]CHU C-K, LIU J K, ZHOU J, et al. Practial ID-based encryption for wireless sensor network[J/OL].[2014-04-20]. http:// eprint.iacr.org/2010/002.
[13]CHOW S S M, LIU J K, ZHOU J Y. Identity-based online/offline key encapsulation and encryption[C]// Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2011: 52-60.
[14]LEWKO A, WATER B. New techniques for dual system encryption: and fully secure HIBE with short ciphertexts[C]// Theory of Cryptography, LNCS 5978. Berlin: Springer-Verlag, 2010: 455-479.
[15]LIU J K, ZHOU J Y. An efficient identity-based online/ offline encryption scheme[C]// Proceedings of the 2009 Applied Cryptography and Network Security, LNCS 5536. Berlin: Springer-Verlag, 2009: 156-167. |