1 |
Dan Boneh and Xavier Boyen, "Efficient selective-ID secure identity -based encryption without random oracles," Advances in Cryptology, EUROCRYPT '04, LNCS 3027, pp. 223-238, 2004.
|
2 |
Dan Boneh, Xavier Boyen, and Shai Halevi. "chosen ciphertext secure public-key threshold encryption without random oracles," CT-RSA'06, LNCS 3860, pp. 226-243, 2006.
|
3 |
Dan Boneh and Matt Franklin, "identity-based encryption from the weil pairing," Advances in Crypto- logy, CRYPT'01, LNCS 2139, pp. 213-229, 2001.
|
4 |
J. Baek and Y. Zheng, "identity-based threshold decryption," public-key Cryptography, PKC'04, LNCS 2947, pp. 262-276, 2004.
|
5 |
R. Canetti and S. Goldwasser, "An efficient threshold public-key cryptosystem secure against adaptive chosen ciphertext attack," Advances in Cryptology, EUROCRYPT'99, LNCS 1592, pp. 90-106, 1999.
|
6 |
Yvo Desmedt and Yair Frankel. "Threshold cryptosystems," Advances in Cryptology, CRYPTO'89, LNCS 435, pp. 307-315, 1990.
|
7 |
V. Daza, J. Herranz, P. Morillo, and C. Rtextmdafols, "CCA2-secure thre- shold broadcast encryption with shorter ciphertexts," Provable Sec- urity'07, LNCS 4784, pp. 35-50, 2007.
|
8 |
Cecile Delerablee and David Pointcheval, "Dynamic threshold public-key encryption," Advances in Cryptology, CRYPTO'08, LNCS 5157, pp. 317-334, 2008.
|
9 |
B. Libert and J.-J. Quisquater, "Efficient revocation and threshold pairing based cryptosystems," ACM Symposium on Principles of Distributed Computing - PODC'03, pp. 163-171, July, 2003.
|
10 |
Adi Shamir, "How to share a secret." Communications of the ACM, pp. 612- 613, Nov, 1979.
|
11 |
Adi Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology, LNCS 196, pp. 47-53, 1985.
|
12 |
Amit Sahai and Brent Waters, "Fuzzy identity-based encryption," Advances in Cryptology, EUROCRYPT'05, LNCS 3494, pp. 457-473, 2005.
|
13 |
Brent Waters, "Efficient identity- based encryption without random oracles," Advances in Cryptology, EUROCRYPT '05, LNCS 3494, pp. 114-127, 2005.
|
14 |
Jinghao Xing, Qiuliang Xu, "An identitybased group-oriented thresh- old encryption scheme," Anti- Counterfeiting, Security and Identification (ASID), 2011 IEEE, pp. 30-33, June, 2011.
|