[1] Shamir A.Identity-based cryptosystems and signature schemes [A].Proceedings of the CRYPTO 1984 [C].LNCS 196.Berlin:Springer-Verlag,1984.47-53.[2] Boneh D,Franklin M.Identity-based encryption from the weil pairing [A].Proceedings of the CRYPTO 2001 [C].LNCS 2139.Berlin:Springer-Verlag,2001.213-229.[3] Sahai A,Waters B.Fuzzy identity-based encryption [A].Proceedings of the EUROCRYPT 2005 [C].LNCS 3494.Berlin:Springer-Verlag,2005.166-180.[4] 杨庚,等.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35 (1):180-184. Yang Gong,et al.A key establish scheme for WSN based on IBE and Diffie-Hellman algorithms[J].Acta Electronica Sinica,2007,35 (1):180-184.(in Chinese)[5] 袁春,文振,张基宏,钟玉琢.基于密码学的访问控制和加密安全数据库[J].电子学报,2006,:2043-2046. Yuan Chun,et al.Progress of cryptographic access control and encryption security database[J].Acta Electronica Sinica,2006,34(11):2043-2046.(in Chinese)[6] Baek J,Susilo W,Zhou J.New constructions of fuzzy identity-based encryption [A].Proceedings of the ACM Symposium on Information Computer and Communication Security 2007 [C].New York:ACM,2007.368-370.[7] Ren Y,et al.New fuzzy identity-based encryption in the standard model[J].Informatica,2010,21(3):393-4074.[8] Sarier N.A new biometric identity based encryption scheme secure against DoS attacks[J].Security and Communication Networks,2011,4(1):23-32.[9] Yang Y,Hu Y,Zhang L,Sun C.CCA2 secure biometric identity based encryption with constant-size ciphertext[J].Journal of Zhejiang University-Science C (Computers & Electronics),2011,12(10):819-827.[10] Canetti R,et al.The random oracle methodology revisited[J].Journal of the ACM,2004,51(4):557-594.[11] Tian M,Yang W,Huang L.Security of a biometric identity-based encryption scheme [J/OL].http://arxiv.org/abs/1110.2653v2,2013-01-24.[12] Tian M,Huang L,Yang W.Secruity analysis of a fuzzy identity-based encryption scheme [J/OL].http://eprint.iacr.org/2011/523,2013-01-24.[13] Boneh D,Boyen X,Goh E.Hierarchical identity based encryption with constant size ciphertext [A].Proceedings of the EUROCRYPT 2005 [C].LNCS 3494.Berlin:Springer-Verlag,2005:166-180. |