[1] AMOS F, MONI N. Broadcast encryption[C]//CRYPTO 1993:Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology. Berlin:Springer, 1994:480-491. [2] DAN B, CRAIG G, BRENT W. Collusion resistant broadcast encryption with short ciphertexts and private keys[C]//CRYPTO 2005:Proceedings of the 25th Annual International Cryptology Conference on Advances in Cryptology, LNCS 3621. Berlin:Springer, 2005:258-275. [3] ADI S. Identity-based cryptosystems and signature schemes[C]//Proceedings of CRYPTO 1984 on Advances in Cryptology, LNCS 196. Piscataway, NJ:IEEE, 1984:47-53. [4] CÉCILE D. Identity-based broadcast encryption with constant size ciphertexts and private keys[C]//ASIACRYPT 2007:Proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 4833. Piscataway, NJ:IEEE, 2007:200-215. [5] DANIELE M, ODED R. Lattice-based cryptography[M]//BERNSTEIN D J, BUCHMANN J, DAHMEN E. Post Quantum Cryptography. Berlin:Springer, 2009:47-91. [6] WANG J, BI J. Lattice-based identity-based broadcast encryption[EB/OL].[2015-02-10]. https://eprint.iacr.org/2010/288.pdf. [7] LI X, YANG B, GUO Y, et al. Provably secure group based broadcast encryption on lattice[J]. Journal of Information & Computational Science, 2011, 8(2):179-193. [8] 张伟仁, 胡予濮, 杨晓元. 格上新的身份类广播加密方案[J]. 北京邮电大学学报2012, 35(6):112-115.(ZHANG W R, HU Y P, YANG X Y. New identity-based broadcast encryption scheme based on lattice[J]. Journal on Beijing University of Posts and Telecommunications, 2012, 35(6):112-115.) [9] ADELA G. Anonymous lattice-based broadcast encryption[C]//ICT-EurAsia 2013:Proceedings of the 2013 International Conference on Information and Communication Technology, LNCS 7804. Berlin:Springer, 2013:353-362. [10] BENOIT L, PATERSON K G, QUAGLIA E A. Anonymous broadcast encryption:adaptive security and efficient constructions in the standard model[C]//PKC 2012:Proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, LNCS 7293. Berlin:Springer, 2012:206-224. [11] ZHANG X, WANG S, ZHANG W. Forward-secure identity-based broadcast encryption scheme from lattice[J]. Applied Mathematics & Information Sciences, 2015, 9(4):1993-2000. [12] MICCIANCIO D, GOLDWASSER S. Complexity of Lattice Problems:a Cryptographic Perspective[M]. Berlin:Springer, 2002. [13] CHRIS P. Bonsai trees (or, arboriculture in lattice-based cryptography)[EB/OL].[2015-02-10]. https://eprint.iacr.org/2009/359.pdf. [14] GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C]//STOC 2008:Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing. New York:ACM, 2008:197-206. [15] GENTRY C, WATERS B. Adaptive security in broadcast encryption systems (with short ciphertexts)[C]//EUROCRYPT 2009:Proceedings of the 28th Annual International Conference on Advances in Cryptology:the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2009:171-188. [16] DAVID C, DENNIS H, EIKE K, et al. Bonsai trees, or how to delegate a lattice basis[C]//EUROCRYPT 2010:Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 6110. Berlin:Springer, 2010:523-552. |