References
- D. Boneh and X. Boyen, Efficienty Selective-ID Secure Identity based encryption scheme without random oracles, Advances in Cryptology-Eurocrypt 04, LNCS, Vol. 3027, pp. 223-238, 2004. https://doi.org/10.1007/b97182
- D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, LNCS Vol. 2139, pp. 213-229, Springer-Verlag, 2001. https://doi.org/10.1007/3-540-44647-8_13
- Z. Chai, Z. F. Cao, and R. X. Lu, ID-based threshold decryption without random oracles and its application in key escrow, Inforsec 2004, ACM press, pp. 119-124, 2004. https://doi.org/10.1145/1046290.1046314
- B. Libert and J. J. Quisquater, Efficient revocation and threshold pairing based cryp-tosystems, PODC 2003, ACM press, pp. 163-171, 2003. https://doi.org/10.1145/872035.872059
- Y. Long and K.-F. Chen, Construction of dynamic threshold decryption scheme from pairing, International Journal of Network Security, Vol.2, No. 2, pp. 111-113, 2006.
- A. Shamir, Identity based cryptosystems and signature schemes, Advances in Cryptology-Crypto 1984, LNCS Vol. 196, pp. 47-53, Springer-Verlag, 1984.