References
- A. Fiat and M. Naor, "Broadcast Encryption," Advances in Cryptology - Crypto 1994, Springer, LNCS 773, pp.480-491, 1994.
- J. Baek, R. Safavi-Naini, and W. Susilo, "Efficient multi-receiver identity-based encryption and its application to broadcast encryption," Public Key Cryptography - PKC 2005, Springer, LNCS 3386, pp.380-397, 2005.
- Y. Dodis and N. Fazio, "Public Key Broadcast Encryption for Stateless Receivers," ACM-DRM 2002, 2002.
- D. Naor, M. Naor, and J. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Advances in Cryptology - Crypto 2001, Springer, LNCS 2139, pp.41-62, 2001.
- O. Baudron, D. Pointcheval, and J. Stern, "Exteded Notions of Security for Multicast Public Key Cryptosystems," ICALP 2000, Springer, LNCS 1853, pp.499-511, 2000.
- M. Bellare, A. Boldyreva, and S. Micali, "Public-key encryption in a multi-user setting: Security proofs and improvements," Advances in Cryptology - Eurocrypt 2000, Springer, LNCS 1807, pp.259-274, 2000.
- K. Kurosawa, "Multi-Recipient Public-Key Encryption with Shortened Ciphertext," Public Key Cryptography - PKC 2002, Springer, LNCS 2274, pp.48-63, 2002.
- M. Bellare, A. Boldyreva, and D. Pointcheval, "Multi-recepient encryption schemes: Security notions and randomness re-use," Public Key Cryptography - PKC 2003, Springer, LNCS 2567, pp. 85-99, 2003.
- D. Boneh and M. Franklin, "Identity-based encryption from the weil paring," Advances in Cryptology - Crypto 2001, Springer, LNCS 2139, pp. 213-229, 2001.
- L. Chen, K. Harrison, D. Soldera, and N. P. Smart, "Applications of Multiple Trust Authorities in Pairing Based Cryptosystems," InfraSec 2002, Springer, LNCS 2437, pp.260-275, 2002.
- N. P. Smart, "Access Control Using Pairing Based Cryptography," CT-RSA 2003, Springer, LNCS 2612, pp.111-121, 2003.
- S. S. Al-Riyami and K. Paterson, "Certificateless public key cryptography," Advances in Cryptology - Asiacrypt 2003, Springer, LNCS 2894, pp. 452-473, 2003.
- S. S. Al-Riyami and K. Paterson, "CBE from CL-PKE: A generic construction and efficient scheme," Public Key Cryptography - PKC 2005, Springer, LNCS 3386, pp.398-415, 2005.
- J. Baek, R. Safavi-Naini, and W. Susilo, "Certificateless public key encryption without pairing," ISC 2005, Springer, LNCS 3650, pp.134-148, 2005.
- B. Libert and J. Quisquater, "On constructing certificateless cryptosystem from identity based encryption," Public Key Cryptography - PKC 2006, Springer, LNCS 3958, pp.474-490, 2006.
- 서철, 정채덕, 박영호, 이경현, "무인증서기반 프락시 재암호화 기법 및 다중 KGC 환경으로의 확장," 한국멀티미디어학회 논문지 제12권 4호, pp. 530-539, 2009.
- D. Boneh and X. Boyen, "Efficient selective-id secure identity based encryption without random oracles," Advances in Cryptology - Eurocrypt 2004, Springer, LNCS 3027, pp.223-238, 2004.
- MIRACL, Multiprecision Integer and Rational Arithmetic C/C++ Library, http://indigo.ie/mscott.
- M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," ACM CCS' 93, pp.62-73, 1993.
- D. Boneh and X. Boyen, "Short signatures without random oracles," Advances in Cryptology - Eurocrypt 2004, Springer, LNCS 3027, pp. 56-73, 2004.
- X. Boyen, "The BB1 Identity-based cryptosystem : A standard for Encryption and Key Encapsulation," http://grouper.ieee.org/groups/ 1363/IBC/submissions/index.html, Submitted 2006-08-14.
- R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," Advances in Cryptology - Eurocrypt 2003, Springer, LNCS 2656, pp.255-271, 2003.
- L. Chen and Z. Chen, "Security proof of Sakai-Kasahara's identity-based encryption scheme," Cryptography ePrint Archive, Report 2005/226, 2005.
- E. Fujisaki and T. Okamoto, "How to enhance the security of public-key encryption at minimum cost," Public Key Cryptography - PKC' 99, Springer, LNCS 1560, pp.53-68, 1999.
- E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," Advances in Cryptology - Crypto' 99, Springer, LNCS 1666, pp.535-554, 1999.
Cited by
- Gradual Encryption of Medical Image using Non-linear Cycle and 2D Cellular Automata Transform vol.17, pp.11, 2014, https://doi.org/10.9717/kmms.2014.17.11.1279
- Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication vol.2021, pp.None, 2011, https://doi.org/10.1155/2021/5599996