1 |
A. Boldyreva, V. Goyal and V. Kumar, "Identity-based encryption with efficient revocation", Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 417-426, Oct. 2008.
|
2 |
D. Boneh and X. Boyen, "Efficient selective-id identity based encryption without random oracles", Advances in Cryptology, EUROCRYPT'04, LNCS 3027, pp. 223-238, 2004.
|
3 |
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," Advances in Cryptology, CRYPTO'01, LNCS 2139, pp. 213-229, 2001.
|
4 |
C. Gentry, "Practical identity-based encryption without random oracles," Advances in Cryptology, EUROCRYPT'06, LNCS 4004, pp. 445-464, 2006.
|
5 |
O. Goldreich, The Foundations of Cryptography, Basic Techniques, vol. 1, Cambridge University Press, 2001.
|
6 |
V. Goyal, "Reducing trust in the PKG in identity based cryptosystems," Advances in Cryptology, CRYPTO'07, LNCS 4622, pp. 430-447, 2007.
|
7 |
V. Goyal, S. Lu, A. Sahai and B. Waters, "Black-box accountable authority identity-based encryption," Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 427-436, Oct. 2008.
|
8 |
J. Groth and A. Sahai, "Efficient Non-interactive Proof Systems for Bilinear Groups", Advances in Cryptology, EUROCRYPT'08, LNCS 4965, pp. 415-432, 2008.
|
9 |
A. Kiayias and G. Tang, "Making Any Identity-Based Encryption Accountable, Efficiently," European Symposium on Research in Computer Security, pp. 326-346, Sep. 2015.
|
10 |
J. Lai, R.H. Deng, Y. Zhao and J. Weng, "Accountable authority identitybased encryption with public traceability," Topics in Cryptology-CT-RSA'13, LNCS 7779, pp. 326-342, 2013.
|
11 |
B. Libert and D. Vergnaud, "Towards black-box accountable authority IBE with short ciphertexts and private keys", Proc. of the PKC'09, LNCS 5443, pp. 235-255, 2009.
|
12 |
B. Libert and D. Vergnaud, "Adaptive-id secure revocable identitybased encryption", Topics in Cryptology-CT-RSA'09, LNCS 5473, pp. 1-15, 2009.
|
13 |
C.P. Schnorr, "Efficient Identification and Signatures for Smart Cards", Advances in Cryptology, CRYPTO'89, LNCS 435, pp. 239-252, 1990.
|
14 |
D. Naor, M. Naor and J. Lotspiech, "Revocation and tracing schemes for stateless receivers", Advances in Cryptology, CRYPTO'01, LNCS 2139, pp. 41-62, 2001.
|
15 |
M. Naor and B. Pinkas, "Efficient oblivious transfer protocols", Proceedings of the 12th annual ACM-SIAM symposium on Discrete algorithms. Society for Industrial and Applied Mathematics, pp. 448-457, Jan. 2001.
|
16 |
A. Sahai and B. Waters, "Fuzzy identity based encryption", Advances in Cryptology, EUROCRYPT'05, LNCS 3494, pp. 457-473, 2005.
|
17 |
J.H. Seo and K. Emura, "Revocable identity-based encryption revisited: Security model and construction", Proc. of the PKC'13, LNCS 7778, pp. 216-234, 2013.
|
18 |
A. Shamir, "Identity-based cryptosystems and signature schemes", Advances in Cryptology, CRYPTO'84, LNCS 196, pp. 47-53, 1985.
|
19 |
B. Waters, "Efficient identity-based encryption without random oracles", Advances in Cryptology, EUROCRYPT'05, LNCS 3494, pp. 114-127, 2005.
|