[1] |
SHAMIR A . Identity-based cryptosystems and signature schemes[C]// Advances in Cryptology. Berlin:Springer, 2007: 47-53.
|
[2] |
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing[C]// Advances in Cryptology 2001. Berlin:Springer, 2001: 213-229.
|
[3] |
HORWITZ J , LYNN B . Toward hierarchical identity-based encryption[C]// Advances in Cryptology. Berlin:Springer, 2002: 466-481.
|
[4] |
BONEH D , BOYEN X . Efficient selective-id secure identity-based encryption without random oracles[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2004: 223-238.
|
[5] |
WATERS B . Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[C]// Annual International Cryptology Conference. Berlin:Springer, 2009: 619-636.
|
[6] |
LEWKO A , WATERS B . Unbounded HIBE and attribute-based encryption[C]// Advances in Cryptology. Berlin:Springer, 2011: 547-567.
|
[7] |
BOYEN X , WATERS B . Anonymous hierarchical identity-based encryption (without random oracles)[C]// Lecture Notes in Computer Science. Berlin:Springer, 2006: 290-307.
|
[8] |
LANGREHR R , PAN J X . Tightly secure hierarchical identity-based encryption[C]// International Workshop on Public Key Cryptography. Berlin:Springer, 2019: 436-465.
|
[9] |
LANGREHR R , PAN J X . Hierarchical identity-based encryption with tight multi-challenge security[C]// IACR International Conference on Public-Key Cryptography. Cham:Springer, 2020: 153-183.
|
[10] |
BLAZY O , KILTZ E , PAN J X . (Hierarchical) identity-based encryption from affine message authentication[C]// Annual Cryptology Conference. Berlin:Springer, 2014: 408-425.
|
[11] |
GONG J Q , CAO Z F , TANG S H ,et al. Extended dual system group and shorter unbounded hierarchical identity based encryption[J]. Designs,Codes and Cryptography, 2016,80(3): 525-559.
|
[12] |
LANGREHR R , PAN J X . Tightly secure hierarchical identity-based encryption[J]. Journal of Cryptology, 2020,33: 1787-1821.
|
[13] |
Cryptography Standardization Technical Committee. SM9 identity-based cryptographic algorithm:GM/T0044-2016[S]. 2016.
|
[14] |
赖建昌, 黄欣沂, 何德彪 ,等. 国密SM9数字签名和密钥封装算法的安全性分析[J]. 中国科学(信息科学), 2021,51(11): 1900-1913.
|
|
LAI J C , HUANG X Y , HE D B ,et al. Security analysis of SM9 digital signature and key encapsulation[J]. Scientia Sinica (Informationis), 2021,51(11): 1900-1913.
|
[15] |
赖建昌, 黄欣沂, 何德彪 . 一种基于商密SM9的高效标识广播加密方案[J]. 计算机学报, 2021,44(5): 897-907.
|
|
LAI J C , HUANG X Y , HE D B . An efficient identity-based broadcast encryption scheme based on SM9[J]. Chinese Journal of Computers, 2021,44(5): 897-907.
|
[16] |
秦宝东, 张博鑫, 白雪 . 基于仲裁的SM9标识加密算法[J]. 计算机学报, 2022,45(2): 412-426.
|
|
QIN B D , ZHANG B X , BAI X . Mediated SM9 identity-based encryption algorithm[J]. Chinese Journal of Computers, 2022,45(2): 412-426.
|
[17] |
赖建昌, 黄欣沂, 何德彪 ,等. 基于商用密码SM9的高效分层标识加密[J]. 中国科学(信息科学), 2023,53(5): 918-930.
|
|
LAI J C , HUANG X Y , HE D B ,et al. An efficient hierarchical identity-based encryption based on SM9[J]. Scientia Sinica (Informationis), 2023,53(5): 918-930.
|
[18] |
BONEH D , BOYEN X , GOH E J . Hierarchical identity based encryption with constant size ciphertext[C]// Lecture Notes in Computer Science. Berlin:Springer, 2005: 440-456.
|
[19] |
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts[C]// Proceedings of the 20th USENIX Security Symposium. Berkeley:USENIX Association, 2011: 523-538.
|
[20] |
FUJISAKI E , OKAMOTO T . Secure integration of asymmetric and symmetric encryption schemes[J]. Journal of Cryptology, 2013,26(1): 80-101.
|