1 |
X. Boyen, "The BB1 Identity-based cryptosystem : A standard for Encryption and Key Encapsulation," http://grouper.ieee.org/groups/ 1363/IBC/submissions/index.html, Submitted 2006-08-14.
|
2 |
R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," Advances in Cryptology - Eurocrypt 2003, Springer, LNCS 2656, pp.255-271, 2003.
|
3 |
L. Chen and Z. Chen, "Security proof of Sakai-Kasahara's identity-based encryption scheme," Cryptography ePrint Archive, Report 2005/226, 2005.
|
4 |
E. Fujisaki and T. Okamoto, "How to enhance the security of public-key encryption at minimum cost," Public Key Cryptography - PKC' 99, Springer, LNCS 1560, pp.53-68, 1999.
|
5 |
E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," Advances in Cryptology - Crypto' 99, Springer, LNCS 1666, pp.535-554, 1999.
|
6 |
D. Boneh and X. Boyen, "Efficient selective-id secure identity based encryption without random oracles," Advances in Cryptology - Eurocrypt 2004, Springer, LNCS 3027, pp.223-238, 2004.
|
7 |
MIRACL, Multiprecision Integer and Rational Arithmetic C/C++ Library, http://indigo.ie/mscott.
|
8 |
N. P. Smart, "Access Control Using Pairing Based Cryptography," CT-RSA 2003, Springer, LNCS 2612, pp.111-121, 2003.
|
9 |
M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," ACM CCS' 93, pp.62-73, 1993.
|
10 |
D. Boneh and X. Boyen, "Short signatures without random oracles," Advances in Cryptology - Eurocrypt 2004, Springer, LNCS 3027, pp. 56-73, 2004.
|
11 |
S. S. Al-Riyami and K. Paterson, "Certificateless public key cryptography," Advances in Cryptology - Asiacrypt 2003, Springer, LNCS 2894, pp. 452-473, 2003.
|
12 |
S. S. Al-Riyami and K. Paterson, "CBE from CL-PKE: A generic construction and efficient scheme," Public Key Cryptography - PKC 2005, Springer, LNCS 3386, pp.398-415, 2005.
|
13 |
O. Baudron, D. Pointcheval, and J. Stern, "Exteded Notions of Security for Multicast Public Key Cryptosystems," ICALP 2000, Springer, LNCS 1853, pp.499-511, 2000.
|
14 |
J. Baek, R. Safavi-Naini, and W. Susilo, "Certificateless public key encryption without pairing," ISC 2005, Springer, LNCS 3650, pp.134-148, 2005.
|
15 |
B. Libert and J. Quisquater, "On constructing certificateless cryptosystem from identity based encryption," Public Key Cryptography - PKC 2006, Springer, LNCS 3958, pp.474-490, 2006.
|
16 |
서철, 정채덕, 박영호, 이경현, "무인증서기반 프락시 재암호화 기법 및 다중 KGC 환경으로의 확장," 한국멀티미디어학회 논문지 제12권 4호, pp. 530-539, 2009.
|
17 |
M. Bellare, A. Boldyreva, and S. Micali, "Public-key encryption in a multi-user setting: Security proofs and improvements," Advances in Cryptology - Eurocrypt 2000, Springer, LNCS 1807, pp.259-274, 2000.
|
18 |
D. Boneh and M. Franklin, "Identity-based encryption from the weil paring," Advances in Cryptology - Crypto 2001, Springer, LNCS 2139, pp. 213-229, 2001.
|
19 |
K. Kurosawa, "Multi-Recipient Public-Key Encryption with Shortened Ciphertext," Public Key Cryptography - PKC 2002, Springer, LNCS 2274, pp.48-63, 2002.
|
20 |
M. Bellare, A. Boldyreva, and D. Pointcheval, "Multi-recepient encryption schemes: Security notions and randomness re-use," Public Key Cryptography - PKC 2003, Springer, LNCS 2567, pp. 85-99, 2003.
|
21 |
L. Chen, K. Harrison, D. Soldera, and N. P. Smart, "Applications of Multiple Trust Authorities in Pairing Based Cryptosystems," InfraSec 2002, Springer, LNCS 2437, pp.260-275, 2002.
|
22 |
A. Fiat and M. Naor, "Broadcast Encryption," Advances in Cryptology - Crypto 1994, Springer, LNCS 773, pp.480-491, 1994.
|
23 |
J. Baek, R. Safavi-Naini, and W. Susilo, "Efficient multi-receiver identity-based encryption and its application to broadcast encryption," Public Key Cryptography - PKC 2005, Springer, LNCS 3386, pp.380-397, 2005.
|
24 |
D. Naor, M. Naor, and J. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Advances in Cryptology - Crypto 2001, Springer, LNCS 2139, pp.41-62, 2001.
|
25 |
Y. Dodis and N. Fazio, "Public Key Broadcast Encryption for Stateless Receivers," ACM-DRM 2002, 2002.
|