[1] SHAMIR A.Identity-based cryptosystems and signature schemes[A].Annual International Cryptology Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,1985.47-53.
[2] BONEH D,FRANKLIN M.Identity-based encryption from the weil pairing[A].Annual International Cryptology Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,2001.213-229.
[3] BONEH D,BOYEN X.Efficient selective-ID secure identity-based encryption without random oracles[A].International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,2004.223-238.
[4] BONEH D,BOYEN X.Secure identity-based encryption without random oracles[A].Annual International Cryptology Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,2004.443-459.
[5] WATERS B.Efficient identity-based encryption without random oracles[A].International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,2005.114-127.
[6] GENTRY C.Practical identity-based encryption without random oracles[A].International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,2006.445-464.
[7] 李大伟,杨庚,朱莉.一种基于身份加密的可验证秘密共享方案[J].电子学报,2010,38(9):2059-2065. LI Da-wei,YANG Gen,ZHU Li. An ID-based verifiable secret sharing scheme[J].Acta Electronica Sinica,2010,38(9):2059-2065.(in Chinese)
[8] 明洋,王育民.标准模型下可证安全的通配符基于身份加密方案[J].电子学报,2013,41(10):2082-2086. MING Yang,WANG Yu-min.Provably secure identity-based encryption scheme with wildcard in the standard model[J].Acta Electronica Sinica,2013,41(10):2082-2086.(in Chinese)
[9] HU M X,Ye Q,Tang Y L.Efficient batch identity-based fully homomorphic encryption scheme in the standard model[J].IET Information Security,2018,12(6):475-483.
[10] LI X G,XIANG T,CHEN F,GUO S W.Efficient biometric identity-based encryption[J].Information Sciences,2018,465:248-264.
[11] WU L B,ZHANG Y B,CHOO K K,HE D B.Efficient and secure identity-based encryption scheme with equality test in cloud computing[J].Future Generation Computer Systems,2017,73:22-31.
[12] HAN S,LIU S L,QIN B D,GU D W.Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness[J].Designs,Codes and Cryptography,2018,86(3):517-554.
[13] 李顺东,杨坤伟,巩林明,毛庆,刘新.标准模型下可公开验证的匿名IBE方案[J].电子学报,2016,44(3),673-678. LI Shun-dong,YANG Kun-wei,GONG Lin-ming,MAO Qing,LIU Xin.A publicly verifiable anonymous IBE scheme in the standard model[J].Acta Electronica Sinica,2016,44(3),673-678.(in Chinese) |