共 12 条
- [1] Fiat A., Naor M., Broadcast encryption, CRYPTO0 93, pp. 480-491, (1993)
- [2] Sun J., Hu Y.P., Zhang L.Y., CCA-secure unidirectional proxy broadcast re-encryption in the standard model, Journal of Computational Information Systems, 8, 14, pp. 5909-5916, (2012)
- [3] Delerablee C., Paillier P., Pointcheval D., Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys, Pairing 2007. LNCS. 4575, pp. 39-59, (2007)
- [4] Hu L., Liu Z.L., Cheng X.H., Efficient identity-based broadcast encryption without random oracles, Journal of Computers, 5, 3, pp. 331-336, (2010)
- [5] Gao S., Ma W.P., Zhao Y.B., Zhuo Z.P., Walsh spectrum of cryptographically concatenating functions and its applications in constructing resilient Boolean functions, Journal of Computational Information Systems, 7, 4, pp. 1074-1081, (2011)
- [6] Zhang L.Y., Hu Y.P., Mu N.B., Identity-based broadcast encryption protocol for ad hoc networks, IEEE Computer Society, pp. 1619-1623, (2009)
- [7] Dan B., Giovanni D.C., Rafail O., Public key encryption with keyword search, Advances in Cryptology-EUROCRYPT 2004, LNCS. 3027, pp. 506-522
- [8] Dan B., Brent W., Conjunctive, subset and range queries on encrypted data, TCC 2007: 4th Theory of Cryptography Conference, LNCS. 4392, pp. 535-554, (2007)
- [9] Jonathan K., Amit S., Brent W., Predicate encryption supporting disjunction, polynomial equations, and inner products, Advances in Cryptology-EUROCRYPT 2008, LNCS. 4965, pp. 146-162, (2008)
- [10] Allison L., Tatsuaki O., Amit S., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, Advances in Cryptology-EUROCRYPT 201, pp. 62-91, (2010)