共 19 条
[1]
Fiat, Naor M., Broadcast encryption, Crypto. Lecture Notes In Computer Science, 773, pp. 480-491, (1993)
[2]
Dodis Y., Fazio N., Public key broadcast encryption for stateless receivers, ACM Workshop On Digital Rights Management, Lecture Notes In Computer Science, 2696, pp. 61-80, (2002)
[3]
Dodis Y., Fazio N., Public key broadcast encryption secure against adaptive chosen ciphertext attack, Public Key Cryptography, Lecture Notes In Computer Science, 2567, pp. 100-115, (2003)
[4]
Boneh D., Gentry C., Waters B., Collusion resistant broadcast encryption with short ciphertexts and private keys, CRYPTO, Lecture Notes In Computer Science, 3621, pp. 258-275, (2005)
[5]
Delerablee P.P., Pointcheval D., Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys, Pairing-Based Cryptography, Lecture Notes In Computer Science, 4575, pp. 39-59, (2007)
[6]
Shamir, Identity-based Cryptosystems and Signature Schemes, Crypto, Lecture Notes In Computer Science, 196, pp. 47-53, (1984)
[7]
Boneh M.F., Identity Based Encryption from the Weil Pairing, CRYPTO, Lecture Notes In Computer Science, 2139, pp. 213-229, (2001)
[8]
Boneh X.B., Efficient Selective-ID Identity Based Encryption without Random Oracles, Eurocrypt, Lecture Notes In Computer Science, 3027, pp. 223-238, (1936)
[9]
Efficient identity-based encryption without random oracles, Proceedings of Eurocrypt 2005, LNCS, (2005)
[10]
Boyen B.X., Goh E.J., Hierarchical Identity Based Encryption with Constant Size Ciphertext, Eurocrypt, Lecture Notes In Computer Science, 3494, pp. 440-456, (2005)