Acknowledgement
Grant : car-헬스케어 보안 기술개발
Supported by : 한국산업기술평가관리원
References
- D. Boneh and X. Boyeh, "Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles," In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238, 2004.
- D. Boneh, and M. Franklin, "Identity- Based Encryption from the Weil pairing," In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229, 2001.
- X. Boyen, "Multipurpose Identity-Based Signcryption A Swiss Army Knife for Identity-Based Cryptography" In: Boneh, D. (ed.) CRYPTO 2003, pp. 383-399, Aug. 2003.
- R. Canetti, S. Halevi and J. Katz, "Chosen-ciphertext security from udentity- based encryption," In: Proceedings of Eurocrypt 2004, LNSC, pp. 207-222, 2004.
- S. S. M. Chow, T. H. Yuen, L. C. K. Hui and S. M. Yiu, "Signcryption in Hierarchical Identity Based Cryptosystem," In: Security and Privacy in the Age of Ubiquitous Computing, Springer Boston, vol.181, pp. 443-457, 2005. https://doi.org/10.1007/0-387-25660-1_29
- S. Even, O. Goldreich, S. Micali, "Online/ Offline Digital signature," In: Brassard, G. (eds.) CRYPTO 1989. LNCS, vol.435, pp. 263-275, 1990.
- C. Gentry, "Practical Identity-Based Encryption Without Random Oracles," In: Vaudenay, S. (eds.) EUROCRYPT 2006. LNCS 4004, pp. 445-464, 2006.
- F. Guo, Y. Mu and Z. Chen, "Identity- based online/offline encryption," In: Tsudik, G. (eds.) FC 2008. LNCS, vol.5143, pp. 247-261, 2008.
- J. Li, X. Chen, F. Zhang and Y. Wang, "Generalization of the Selective-ID Security Model for HIBS Protocols," In: Y. Wang, Y. Chung, and H.Liu (ed.) CIS 2003, LNAI, vol.4456, pp. 894-902, 2007.
- J.K. Liu and J. Zhou, "An Efficient Identity-Based Online/Offline Encryption Scheme" In: Abdalla, M. (eds.) ACNS 2009. LNCS 5536, pp. 156-167, 2009
- J.K. Liu and J. Zhou, "An Efficient Identity-Based Online/Offline Encryption Scheme" In: Abdalla, M. (eds.) ACNS 2009. LNCS 5536, pp. 156-167, 2009
- S.F. Shahandashti and R. Safavi-Naini, "Theshold Attribute-Based Signatures and Their Application to Anonymous Credential systems," In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS 5580, pp. 198-216, 2009.
- A. Shamir, "Identity-based cryptosystems and signature schemes," In: Advances in Cryptology -Crypto 1984,, LNSC 196, pp. 47-53, 1984
- B. Waters, "Efficient Identity-Based Encryption without Random Oracles," In: Cramer, R.J.F. (eds.) EUROCRYPT 2005. LNCS 3494, pp. 114-127, 2005.
- Y. Yu, B. Yang, Y. Sun and S. Zhu, "Identity-Based Signcryption Scheme Without Random Oracles," In: CSI 2009. vol.31, pp. 56-62, 2009.
- J. K. Liu, J. Baek, J. Zhou, "Online/ Offline Identity-Baed Signcryption Re-visited," In: Cryptology ePrint Archive, Report 2010-274, May 2010.
- S. Xu, Y. Mu and W. Susilo, "Online/ Offline Signatures and Multisignatures for AVOD and DSR routing security," In: ACISP 06, LNCS 4058, pp. 99-110, 2006