1 |
X.M. Hu, S.T. Huang, and X. Fan, "Practical Hierarchical Identity Based Encryption Scheme without Random Oracles," IEICE Trans. Fundamentals Electron. Commun. Comput. Sci., E92.A, no. 6, June 2009, pp. 1494-1499.
|
2 |
B. Waters, "Efficient Identity-Based Encryption without Random Oracles," Proc. EUROCRYPT, LNCS, vol. 3494, 2005, pp. 114- 127.
|
3 |
B. Waters, "Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions," Proc. CRYPTO, LNCS, vol. 5677, 2009, pp. 619-636.
|
4 |
A. Lewko and B. Waters, "New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts," Proc. TCC, LNCS, vol. 5978, 2010, pp. 455-479.
|
5 |
Y.L. Ren and D.W. Gu. "Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model," Informatica, vol. 32, no. 2, 2008, pp. 207-211
|
6 |
X. Wang and X. Yang, "Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model," Cryptology ePrint Archive, Report 2010/113, 2010.
|
7 |
D. Cash, D. Hofheinz, and E. Kiltz, "How to Delegate a Lattice Basis," Cryptology ePrint Archive, Report 2009/351 (2009). http://eprint.iacr.org/
|
8 |
S. Agrawal, D. Boneh, and X. Boyen, "Efficient Lattice (H)IBE in the Standard Model," Proc. EUROCRYPT, LNCS, vol. 6110, 2010, pp. 553-572
|
9 |
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Proc. CRYPTO, LNCS, vol. 196, 1985, pp. 47-53.
|
10 |
D. Boneh and M. Franklin. "Identity Based Encryption from the Weil Pairing," Proc. CRYPTO, LNCS, vol. 2139, 2001, pp. 213-229.
|
11 |
J. Sun and Y. Fang, "Cross-Domain Delegation for Sensitive Data Sharing in Distributed Electronic Health Record Systems," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 6, 2010, pp. 754-764.
|
12 |
L. Yan, C.M. Rong, and G.S. Zhao, "Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography," CloudCom, LNCS, vol. 5931, 2009, pp. 167-177.
|
13 |
N.P. Smart and B. Warinschi, "Identity Based Group Signatures from Hierarchical Identity-Based Encryption," Pairing, LNCS, vol. 5671, 2009, pp. 150-170.
|
14 |
C. Gentry and A. Silverberg, "Hierarchical ID-Based Cryptography," Proc. ASIACRYPT, LNCS, vol. 2501, 2002, pp. 548 -566.
|
15 |
D. Boneh and X. Boyen, "Efficient Selective-ID Secure Identity- Based Encryption without Random Oracles," Proc. EUROCRYPT, LNCS, vol. 3027, 2004, pp. 223-238.
|
16 |
D. Boneh, X. Boyen, and E. Goh, "Hierarchical Identity Based Encryption with Constant Ciphertext," Proc. EUROCRYPT, LNCS, vol. 3494, 2005, pp. 440-456.
|
17 |
J.H. Seo and J.H. Cheon, "Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts." http://eprint.iacr.org/2011/021
|
18 |
J.H. Seo et al., "Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts," IEICE Trans. Fundamentals, vol. E94.A, no. 1, 2011, pp. 45-56.
|