[1] |
SHAMIR A . Identity-based cryptosystems and signature schemes[A]. CRYPTO 1984 LNCS 196[C]. Springer, Heidelberg, 1985.47-53.
|
[2] |
CANETTI R , HALEVI S , KATZ J . Chosen ciphertext security from identity based encryption[A]. Advances in Cryptology-Eurocrypt 2004, LNCS 3027[C]. Springer-Verlag, 2004.207-222.
|
[3] |
WATERS B . Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions[A]. Advances in Cryptology-Crypto 2009, LNCS 5677[C]. Springer-Verlag, 2009.619-636.
|
[4] |
LEWKO A , WATERS B . New techniques for dual system encryption and fully secure HIBE with short ciphertexts[A]. Proceeding of TCC 2010, LNCS 5978[C]. Springer-Verlag, 2010.455-479.
|
[5] |
LIANG X H . Research on Attribute Based Cryptosystem[D]. Shanghai: Shanghai Jiao Tong University, 2009.
|
[6] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. EUROCRYPT 2005 LNCS 3494[C]. Springer, Heidelberg, 2005.457-473.
|
[7] |
YANG P Y , CAO Z F , DONG X L . Fuzzy identity based signature with applications to biometric authentication[J]. Computers & Electri-cal Engineering, 2011,37 (4):532-540.
|
[8] |
LI F G , KHAN M K . A biometric identity-based signcryption scheme[J]. Future Generation Computer Systems, 2012,28 (1):306-310.
|
[9] |
WANG M W , REN Z Y , CAI J . A biometric signcryption scheme without bilinear pairing[A]. International Conference on Graphic and Image Processing (ICGIP 2012)[C]. Singapore, 2013.
|
[10] |
GOYAL V , PANDEY O , SAHAI A . Attribute-based encryption for fine-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Security[C]. Alexandria, VA, USA, 2006.221-238.
|
[11] |
ZHENG Y L . Digital signcryption or how to achieve cost (signature &encryption) << cost (signature) + cost (encryption)[A]. Cryptol-ogy-CRYPTO'97, LNCS 1294[C]. Berlin, New York, Tokyo, 1997.165-179.
|
[12] |
ZHANG M W , YANG B . Fuzzy biometric signcryption scheme with bilinear pairings in the standard model[A]. Proceeding of PAISI 2010, LNCS 6122[C]. Springer-Verlag Berlin Heidelberg, 2010.77-87.
|
[13] |
HU C Q , ZHANG N , LI H . Body area network security: a fuzzy attrib-ute-based signcryption scheme[EB/OL]. , 2012-09-15/2013-05-06.
|
[14] |
GUO Z Z , LI M C , FAN X X . Attribute-based ring signcryption scheme[J]. Security and Communication Networks, 2013,6 (6):790-796.
|
[15] |
LI X X , QIAN H F , WENG J . Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model[J]. Mathe-matical and Computer Modelling, 2013,57 (3-4):503-511.
|
[16] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22 (11):612-613.
|