[1] |
GENTRY C , SILVERBERG A . Hierarchical id-based cryptography,advances in cryptology[C]// ASIACRYPT 2002. 2002: 548-566.
|
[2] |
HORWITZ J , LYNN B . Toward hierarchical identity-based encryption[C]// EUROCRYPT. 2002: 466-481.
|
[3] |
BONEH D , FRANKLIN M . Identity-based encryption from theweil pairing[C]// Advances in Cryptology CRYPTO 2001. 2001: 213-229.
|
[4] |
LAI J , DENG R H , LIU S ,et al. Identity-based encryption secure against selective opening chosen-ciphertextattack[C]// Advances in Cryptology EUROCRYPT 2012. 2012: 77-92.
|
[5] |
YAMADA S , . Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters[C]// Advances in Cryptology EUROCRYPT2016. 2016: 32-62.
|
[6] |
WANG F H , LIU Z H , WANG C X . Full secure identity-based encryption scheme with short public key size over lattices in the standard model[J]. The International Journal of Computer Mathematics, 2016,93(6): 854-863.
|
[7] |
REGEV O . On lattices,learning with errors,random linear codes,and cryptography[J]. The Annual ACM Symposium on Theory of Computing, 2009,56(6): 84-93.
|
[8] |
NGUYEN P , ZHANG J , ZHANG Z F . Simpler efficient group signatures from lattices[C]// Public-Key Cryptography. 2015: 401-426.
|
[9] |
BRAKERSKI Z , PERLMAN R . Lattice-based fully dynamic multi-key FHE with short ciphertexts[C]// CRYPTO2016. 2016: 190-213.
|
[10] |
LIBERT B , LING S , NGUYEN K ,et al. Zero-knowledge arguments for lattice-based accumulators,logarithmic-size ring signatures and group signatures without trapdoors[C]// Advances in Cryptology EUROCRYPT 2016. 2016: 1-31.
|
[11] |
段然, 顾纯祥, 祝跃飞 ,等. NTRU 格上高效的基于身份的全同态加密体制[J]. 通信学报, 2017,38(1): 66-75.
|
|
DUAN R , GU C X , ZHU Y F ,et al. Efficient identity-based fully homomorphic encryption over NTRU[J]. Journal on Communications, 2017,38(1): 66-75.
|
[12] |
CASH D , HOFHEINZ D , KILTZ E ,et al. Bonsai trees,or how to delegate lattice basis[C]// Advances in Cryptology EUROCRYPT 2010. 201025(4): 523-552.
|
[13] |
GENTRY C , PEIKERT C , VAIKUNTANATHAN V . Trapdoors for hard lattices and new cryptographic constructions[C]// The 40th ACM Symposium on Theory of Computing. 2008: 197-206.
|
[14] |
AGRAWAL S , BONEH D , BOYEN X . Efficient lattice (H)IBE in the standard model[C]// Advances in Cryptology EUROCRYPT2010, 2010: 553-572.
|
[15] |
MICCIANCIO D , PEIKERT C . Trapdoors for lattices:simpler,tighter,faster,smaller[C]// Advances in Cryptology EUROCRYPT2012. 2012: 700-718.
|
[16] |
ALWEN J , PEIKERT C . Generating shorter bases for hard random lattices[C]// The 26th International Symposium on Theoretical Aspects of Computer Science. 2009: 535-553.
|
[17] |
PEIKERT C , . An efficient and parallel Gaussian sampler for lattices[C]// Advances in Cryptology CRYPTO 2010. 2010: 80-97.
|
[18] |
AGRAWAL S , BOYEN X , VAIKUNTANATHAN V ,et al. Functional encryption for threshold functions(or fuzzy IBE) from lattices[C]// 15th International Conference on Practice and Theory in Public Key Cryptography. 2012: 280-297.
|
[19] |
YANG C , ZHENG S , WANG L ,et al. Hierarchical identity-based broadcast encryption scheme from LWE[J]. Journal of Communications & Networks, 2014,16(3): 258-263.
|
[20] |
KATSUMATA S , YAMADA S . Partitioning via non-linear polynomial functions:more compact IBEs from ideal lattices and bilinear maps[C]// Advances in Cryptology ASIACRYPT 2016. 2016: 682-712.
|
[21] |
ZHANG J , CHEN Y , ZHANG Z . Programmable hash functions from lattices:short signatures and IBEs with small key sizes[C]// Advances in Cryptology CRYPTO 2016. 2016: 302-332.
|
[22] |
WANG F H , WANG C X , LIU Z H . Efficient hierarchical identity based encryption scheme in the standard model over lattices[J]. Frontiers of Information Technology & Electronic Engineering, 2016,17(8): 781-791.
|
[23] |
DODIS Y , OSTROVSKY R , REYZIN L ,et al. Fuzzy extractors:How to generate strong keys from biometrics and other noisy data[J]. The Society for Industrial and Applied Mathematics (SIAM), 2008,38(1): 97-139.
|