[1] |
SAHAI A , WATERS B . Fuzzy identity based encryption[A]. Advances in Cryptology (EUROCRYPT 2005)[C]. Berlin, Springer-Verlag, 2005.457-473.
|
[2] |
SHAMIR A . How to share a secret[J]. Communications of he ACM, 1979,22 (11): 612-613.
|
[3] |
SHAMIR A . Identity based crypto systems and signature mes[A]. Advances in Cryptology (CRYPTO 1984)[C]. Berlin, Springer-Verlag, 1984.47-53.
|
[4] |
DAN B , XAVIER B . Efficient selective-id secure identity based en-cryption without random oracles[A]. Proceedings of the International Conference on Advances in Cryptology(EUROCRYPT 2004)[C]. Ber-lin, Springer-Verlag, 2004.223-238.
|
[5] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Berkeley, CA, 2007.321-334.
|
[6] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine grained access control of encrypted data[EB/OL]. .
|
[7] |
MAJI H , PRABHAKARAN M , ROSULEK M . Attribute based signa-tures: achieving attribute privacy and collusion-resistance[EB/OL]. .
|
[8] |
LI J , KIM K . Attribute-based ring signatures[EB/OL]. .
|
[9] |
GAGNé M , NARAYAN S , SAFAVI-NAINI R . Threshold attribute based signcryption[A]. 7th International Conference on Security and Cryptography for Networks[C]. Amalfi,Italy, 2010.154-171.
|
[10] |
EMURA K , MIYAJI A , RAHMAN M . Toward dynamic attribute-based signcryption (poster)[A]. 16th Australasian Conference on Information Security and Privacy[C]. Melbourne, 2011.439-443.
|
[11] |
LIU J , WANG J , ZHANG Y . Attribute-based signcryption scheme on vector space[J]. Acta Electronica Sinica, 2013,41 (4): 776-780.
|
[12] |
WANG C , HUANG J . Attribute-based signcryption with ciphertext policy and claim-predicate mechanism[A]. 7th International Confe-rence on Computational Intelligence and Security, CIS[C]. China, 2011.905-909.
|
[13] |
WEI B D , OU H Y . Signcryption schemes with anonymity[J]. Interna-tional Journal of Advancements in Computing Technology(IJACT), 2011,3 (8): 127-137.
|
[14] |
GUNTHER C G . An identity-based key-exchange protocol, ad-vances[A]. Workshop on the Theory and Application of Cryptographic Techniques[C]. Houthalen Belgium, Springer-Verlag, 1990.29-37.
|
[15] |
DODIS Y , KATZ J , XU S . Key-insulated public-key crypto sys-tems[A]. Advances in Cryptology(EUROCRYPT 2002)[C]. London, Springer-Verlag, 2002.65-82.
|
[16] |
BELLARE M , PALACIO A . Protecting against key exposure: strongly key-insulated encryption with optimal threshold[J]. Applicable Alge-bra in Engineering, Communication and Computing archive, 2006,16 (6): 379-396.
|
[17] |
HANAOKA G , HANAOKA Y , IMAI H . Parallel key-insulated public key encryption[A]. Proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography[C]. New York, 2006.24-26.
|
[18] |
HANAOKA Y , HANAOKA G . Identity based hierarchical strongly key insulated encryption and its application[A]. Proceedings of the 11th International Conference on Theory and Application of Cryptol-ogy and Information Security(EUROCRYPT 2005)[C]. Heidelberg, Springer-Verlag, 2005.495-514.
|
[19] |
WENG J , LIU S . Identity based threshold key insulated encryption without random oracles[A]. Proceedings of the Cryptographers' Track at the RSA Conference[C]. San Francisco, 2008.203-220.
|
[20] |
WENG J , LIU S . Identity based parallel key insulated e yption without random oracles: security notions and construction[A]. Pro-ceedings of the 7th International Conference on Cryptology[C]. Kol-kata, India, Springer-Verlag, 2006.409-423.
|
[21] |
CHEN J H , CHEN K F . Ciphertext policy attribute-based parallel key-insulated encryption[J]. Journal of Software, 2012,23 (10): 2795-2804.
|
[22] |
CHEN J H , YU L . Attribute-based key-insulated encryption[J]. Journal of Information Science and Engineering, 2011,27 (2): 437-449.
|
[23] |
陈剑洪 . 若干密钥隔离密码体制的研究[D]. 上海: 上海交通大学, 2011. CHEN J H . Study on Several Key-Insulated Cryptographic Schemes[D]. Shanghai: Shanghai Jiaotong University, 2011.
|