[1] Fiat A, Naor M. Broadcast Encryption [C]//Advances in Cryptography-CRYPTO'93 Proceeding, LNCS 773. Paris: ACM, 1993: 480-491.
[2] Zhang Y L, Zhang Y K, Zhang J. An ID-based Broadcast Encryption Scheme for Collaborative Design [C]//International Conference on Networks Security, Wireless Communications and Trusted Computing: Vol 2. Wuhan: IEEE, 2009: 699-702.
[3] Delerablee C, Paillier P, Pointcheval D. Fully Collusion Secure Dynamic Broadcast Encryption with Constant-size Ciphertexts or Decryption Keys [C]//Pairing 2007. LNCS 4575. Tokyo: Springer-Verlag, 2007: 39-59.
[4] Hu L, Liu Z L,Cheng X H. Efficient Identity-based Broadcast Encryption without Random Oracles[J]. Journal of Computers, 2010, 5(3): 331-336.
[5] Yu G, Ma X, Shen Y, et al. Provable Secure Identity Based Generalized Signcryption Scheme [J]. Theoretical Computer Science, 2010, 411(40-42): 3614-3624.
[6] Zhang L Y, Hu Y P, Mu N B. An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks [J]. IEEE Computer Society, 2009, 194: 1619-1623.
[7] Vipul G, Omkant P, Amit S, et al. Attribute-Based Encryption for Fine-Grained Access Control for Encrypted Data[C]//ACM CCS 06: 13th Conference on Computer and Communications Security: Vol 309. Alexandria: ACM, 2006: 89-98.
[8] Goyal V, Jain A, Pandey O, et al. Bounded Ciphertext Policy Attribute-based Encryption[C]//ICALP 2008: LNCS 5126. Berlin Heidelberg: Springer-Verlag, 2008: 579-591.
[9] Ostrovksy R, Sahai A, Waters B. Attribute Based Encryption with Non-Monotonic Access Structures [C]//CCS'2007: Vol 139. Alexandria: ACM, 2007: 195-203.
[10] Waters B. Ciphertext-policy Attribute-based Encryption: an Expressive, Efficient, and Provably Secure Realization [C]//PKC 2011, Computer Science: LNCS 6571. Berlin Heidelberg: Springer-Verlag, 2011: 53-70.
[11] Katz J, Sahai A, Waters B. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products[C]//Advances in Cryptology-EUROCRYPT2008: LNCS 4965. Santa Barbara: CiteSeerX, 2008: 146-162.
[12] Allison L, Tatsuaki O, Amit S, et al. Fully Secure Functional Encryption: Attribute-based Encryption and (Hierarchical) Inner Product Encryption[C]//Advances in Cryptology-EUROCRYPT 2010: 62-91: LNCS 6110. French Riviera: Springer-Verlag, 2010: 62-91.
[13] Waters B. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions[C]//Advances in Cryptology-CRYPTO 2009: LNCS 5677. Santa Barbara: Springer-Verlag, 2009: 619-636.
[14] Lewko A B, Brent W. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts[C]//TCC 2010: 7th Theory of Cryptography Conference: LNCS 5978. Zurich: CiteSeerX, 2010: 455-479. |