1 |
C. Gentry, "Certificate-based encryption and the certificate revocation problem," in Proc. of Eurocrypt 2003, LNCS 2656, pp. 272-293, 2003. http://dx.doi.org/10.1007/3-540-39200-9_17
|
2 |
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, "Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile," RFC 5280, IETF, 2008. www.ietf.org/rfc/rfc5280.txt
|
3 |
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, "X.509 Internet public key infrastructure online certificate status protocol - OCSP," RFC 2560, IETF, 1999. www.ietf.org/rfc/rfc2560.txt
|
4 |
D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing," in Proc. of Crypto 2001, LNCS 2139, pp.213-229, 2001. http://dx.doi.org/10.1007/3-540-44647-8_13
|
5 |
D. H. Yum, P. J. Lee, "Identity-based cryptography in public key management," in Proc. of EuroPKI 2004, LNCS 3093, pp.71-84, 2004. http://link.springer.com/chapter/10.1007%2F978-3-540-25980-0_6
|
6 |
Y. Dodis, J. Katz, "Chosen-ciphertext security of multiple encryption," in Proc. of TCC 2005, LNCS 3378, pp.188-209, 2005. http://dx.doi.org/10.1007/978-3-540-30576-7_11
|
7 |
D. Galindo, P. Morillo, C. Ràfols, "Breaking Yum and Lee generic construction of certificate-less and certificate-based encryption schemes," in Proc. of EuroPKI 2006, LNCS 4043, pp.81-91, 2006. dl.acm.org/citation.cfm?id=2107430
|
8 |
Y. Lu, J. G. Li, J. M. Xiao, "Generic construction of certificate-based encryption," in Proc. of 9th International Conference for Young Computer Scientists, IEEE CS, pp.1589-1594, 2008. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4709210
|
9 |
E. Fujisaki, T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," in Proc. of Crypto 1999, LNCS 1666, pp. 537-554, 1999. http://link.springer.com/chapter/ 10.1007/3-540-48405-1_34#page-1
|
10 |
E. Fujisaki, T. Okamoto, "How to enhance the security of public-key encryption at minimum cost," in Proc. of PKC 1999, LNCS 1560, pp. 53-68, 1999. dl.acm.org/citation.cfm?id=746447
|
11 |
B.G. Kang, J.H. Park, "Is it possible to have CBE from CL-PKE," in Proc. of Cryptology ePrint Archive, Report 2005/431. https://eprint.iacr.org/2005/431.pdf
|
12 |
S. S. Al-Riyami, K. G. Paterson, "CBE from CL-PKE: A generic construction and efficient schemes," in Proc. of PKC 2005, LNCS 3386, pp.398-415, 2005. http://dx.doi.org/10.1007/978-3-540-30580-4_27
|
13 |
Y. Lu, J. G. Li, J. M. Xiao, "Constructing efficient certificate-based encryption with pairing," Journal of Computers, vol. 4, no.1, pp.19-26, 2009. http://dx.doi.org/10.4304/jcp.4.1.19-26
|
14 |
R. Sakai, M. Kasahara, "ID based cryptosystems with pairing on elliptic curve," in Proc. of Cryptology ePrint Archive, Report 2003/054. https://eprint.iacr.org/2003/054.pdf
|
15 |
L. Chen, Z. Cheng, "Security proof of Sakai-Kasahara's identity-based encryption scheme," in Proc. of Cryptography and Coding 2005, LNCS 3796, pp. 442-459, 2005. http://link.springer.com/chapter/10.1007%2F978-3-540-30580-4_27
|
16 |
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in Proc. of Crypto 1984, LNCS 196, pp. 10-18, 1985. dl.acm.org/citation.cfm?id=19480
|
17 |
Y. Lu, "An efficient and provably secure certificate-based encryption scheme," in Proc. of ICTMF 2011, CCIS 164, pp. 54-61, 2011. http://dx.doi.org/10.1007/978-3-642-24999-0_8
|
18 |
B. G. Kang, J. H. Park, S. G. Hahn, "A certificate-based signature scheme," in Proc. of CT-RSA, LNCS 2964, pp. 99-111, 2004. http://dx.doi.org/10.1007/978-3-540-24660-2_8
|
19 |
J. G. Li, X. Y. Huang, Y. Mu, W. Susilo, and Q. H. Wu, "Certificate-based signature: security model and efficient construction," in Proc. of EuroPKI'07, LNCS 4582, pp.110-125, 2007. http://link.springer.com/chapter/10.1007/978-3-540-73408-6_8#page-1
|
20 |
J. G. Li, X. Y. Huang, Y. Mu, W. Susilo, and Q. H. Wu, "Constructions of certificate-based signature secure against key replacement attacks," Journal of Computer Security, vol.18, no.3, pp.421-449, 2010. dl.acm.org/citation.cfm?id=1835403
DOI
|
21 |
B. Waters, "Efficient identity-based encryption without random oracles," in Proc. of Eurocrypt 2005, LNCS 3494, pp.114-127, 2005. http://dx.doi.org/10.1007/11426639_7
|
22 |
J. G. Li, X. Y. Huang, Y. C. Zhang, L. Z. Xu, "An efficient short certificate-based signature scheme," Journal of Systems and Software, vol.85, no.2, pp.314-322, 2012. http://dx.doi.org/10.1016/j.jss.2011.08.014
DOI
ScienceOn
|
23 |
J. G. Li, X. Y. Huang, M. X. Hong, Y. C. Zhang, "Certificate-based signcryption with enhanced security features," Computers and Mathematics with Applications, vol.64, no.6, 1587-1601, 2012. http://dx.doi.org/10.1016/j.camwa.2012.01.006
DOI
ScienceOn
|
24 |
R. Canetti, O. Goldreich, S. Halevi, "The random oracle methodology, revisited," Journal of the ACM, Vol. 51(4), pp. 557-594, 2004. http://dx.doi.org/10.1145/1008731.1008734
DOI
ScienceOn
|
25 |
P. Morillo, C. Ràfols, "Certificate-based encryption without random oracles," in Proc. of Cryptology ePrint Archive, Report 2006/12. https://eprint.iacr.org/2006/012.pdf
|
26 |
D. Boneh, J. Katz, "Improved efficiency for CCA-secure cryptosystems built using identity-based encryption," in Proc. of CT-RSA 2005, LNCS 3376, pp. 87-103, 2005. http://dx.doi.org/10.1007/978-3-540-30574-3_8
|
27 |
D. Galindo, P. Morillo, C. Ràfols, "Improved certificate-based encryption in the standard model," Journal of Systems and Software, vol. 81, pp. 1218-1226, 2008. http://dx.doi.org/10.1016/j.jss.2007.09.009
DOI
ScienceOn
|
28 |
J.K. Liu, J. Zhou, "Efficient certificate-based encryption in the standard model," in Proc. of SCN 2008, LNCS 5229, pp. 144-155, 2008. dl.acm.org/citation.cfm?id=1432982
|
29 |
C. Gentry, "Practical identity-based encryption without random oracles," in Proc. of Eurocrypt 2006, LNCS 4004, pp. 445-464, 2006. http://dx.doi.org/10.1007/11761679_27
|
30 |
Y. Lu, J. G. Li, "Generic construction of certificate-based encryption in the standard model," in Proc. of Electronic Commerce and Security 2009, IEEE CS, Vol.1, pp. 25-29, 2009. dl.acm.org/citation.cfm?id=1606750.1607193
|
31 |
MIRACL, "Multiprecision integer and rational arithmetic C/C++ library". http://indigo.ie/mscott/
|
32 |
J. G. Li, Z. W. Wang, Y. C. Zhang, "Provably secure certificate-based signature scheme without pairings," Information Sciences, vol. 233, no. 6, pp. 313-320, 2013. http://dx.doi.org/10.1016/j.ins.2013.01.013
DOI
ScienceOn
|