[1] A Shamir.Identity-based cryptosystems and signature schemes [A].Advances in Cryptology-Crypto 1984 [C].LNCS 0196,Berlin:Springer-Verlag,1984.47-53.[2] D Boneh,M Franklin.Identity-based encryption from the Weil pairing [A].Advances in Cryptology-Crypto 2001 [C].LNCS 2139,Berlin:Springer-Verlag,2001.213-229.[3] 李大伟,杨庚,朱莉.一种基于身份加密的可验证秘密共享方案[J].电子学报,2010,38(9):2059-2065. LI Da-wei,YANG Geng,ZHU Li.An ID based verifieable secret sharing scheme[J].Acta Electronica Sinica,2010,38(9):2059-2065.(in Chinese)[4] 杨庚,等.基于身份加密的无线传感器网络密钥分配方法 [J].电子学报,2007,35(1):180-184. YANG Geng,et al.A key establish scheme for WSN based on IBE and Diffie-Hellman algorithms[J].Acta Electronica Sinica,2007,35(1):180-184.(in Chinese)[5] M Abdalla,D Catalano,A.W Dent,et al.Identity-based encryption gone wild [A].Proceedings of International Colloquium on Automata,Languages and Programming-ICALP 2006 [C].LNCS 4052,Berlin:Springer-Verlag,2006.300-311.[6] M Abdalla,D Catalano,A W Dent,et al.Identity-Based encryption gone wild [J/OL].http://eprint.iacr.org/2006/304,2009-12-20.[7] C Gentry,A Silverberg.Hierarchical ID-based cryptography [A].Advances in Cryptology-Asiacrypt 2002 [C].LNCS 2501,Berlin.Springer-Verlag,2002.548-566.[8] D Boneh,X Boyen.Efficient selective-ID secure identity based encryption without random oracles [A].Advances in Cryptology-Eurocrypt 2004 [C].LNCS 3027,Berlin.Springer-Verlag,2004.223-238.[9] B Waters.Efficient Identity-based encryption without random oracles [A].Advances in Cryptology-Eurocrypt 2005 [C].LNCS 3494,Berlin:Springer-Verlag,2005.114-127.[10] D Boneh,X Boyen,E.-J Goh.Hierarchical identity based encryption with constant size ciphertext [A].Advances in Cryptology-Eurocrypt 2005 [C].LNCS 3494,Berlin.Springer-Verlag,2005.440-456.[11] S Chatterjee,P Sarkar.HIBE with short public parameters without random oracle [A].Advances in Cryptology-Asiacrypt 2006 [C].LNCS 4284,Berlin.Springer-Verlag,2006.145-160.[12] REN Yan-li,GU Da-wu.Secure hierarchical identity based encryption scheme in the standard model [A].Progress in Cryptology-INDOCRYPT 2008 [C].LNCS 5365,Berlin.Springer-Verlag,2008.104-115.[13] J Birkett,A.W Dent,G Neven,et al.Efficient chosen-ciphertext secure identity-based encryption with wildcards [A].Proceedings of Australasian Conference on Information Security and Privacy-ACISP 2007 [C].LNCS 4586,Berlin.Springer-Verlag,2007.274-292.[14] MING Yang,SHEN Xiao-qin,WANG Yu-min.Identity-based encryption with wildcards in the standard model[J].The Jounal of China Universities of Posts and Telecommunications,2009,16(1):64-68.[15] R Canetti,S Halevi,J Kate.A forward-secure public key encryption scheme [A].Advances in Cryptology-Eurocrypt 2003 [C].LNCS 2656,Berlin.Springer-Verlag,2003.255-271.[16] C Gentry.Practical identity-based encryption without random oracles [A].Advances in Cryptology-Eurocrypt 2006 [C].LNCS 4004,Berlin.Springer-Verlag,2006.445-464. |