[1] Smart N P. Efficient Key Encapsulation to Multiple Parties [C]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2005: 208-219.
[2] Barbosa M, Farshim P. Efficient Identity-Based Key Encapsulation to Multiple Parties [C]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2005: 428-441.
[3] Weng Zhiwei, Weng Jian, He Kai, et al. New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability [C]//Lecture Notes in Computer Science. Berlin: Spring-Verlag, 2012: 170-176.
[4] Tseng Y M, Huang Y H, Chang H J. Privacy-preserving Multirecsiver ID-Based Encryption with Provable Security [DB/OL]. [2012-06-29]. http://onlinelibrary.wiley.com/doi/10.1002/dac.2395/abstract.
[5] Takahiro M, Goichiro H. Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited [C]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2013: 332-351.
[6] Hur J, Park C, Hwang S O. Privacy-preserving Identity-based Broadcast Encryption [J]. Information Fusion, 2012, 13(4): 296-303.
[7] Barth A, Boneh D, Waters B. Privacy in Encrypted Content Distribution Using Private Broadcast Encryption [C]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2006: 52-64.
[8] Boneh D, Gentry C. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys [C]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2005: 258-275.
[9] Delerablee C. Identity-based Broadcast Encryption with Cosntant Size Ciphertexts and Private Keys [C]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2007: 200-215.
[10] Ren Yanli, Gu Dawu. Fully CCA2 Secure Identity-based Broadcast Encryption without Random Oracles [J]. Information Processing Letters, 2009, 109(11): 527-533. |