References
- J. Baek, R. Safavi-Naini, and W. Susilo,'Efficient multi-receiver identity-based encryption and its application to broadcast encryption,' Public Key Cryptography - PKC 2005, LNCS 3386, pp. 380-397, 2005
- A. Fiat and M. Naor, 'Broadcast Encryption,' Advances in Cryptology - Crypto 1994, LNCS 773, pp. 480-491, 1994
- Y. Dodis and N.Fazio, 'Public Key Broadcast Encryption for Stateless Receivers,' ACM-DRM, 2002
- O. Baudron, D. Pointcheval, and J. Stem, 'Exteded Notions of Security for Multicast Public Key Cryptosystems,' ICALP 2000, LNCS 1853, pp. 499-511, 2000
- M. Bellare, A. Boldyreva, and S. Micali, 'Public-key encryption in a multi-user setting: Security proofs and improvements,' Advances in Cryptology - Eurocrypt 2000, LNCS 1807, pp. 259-274, 2000
- T. EIGamal, 'A public key cryptosystem and a signature scheme based on discrete logarithms,' IEEE Transactions on Information Theory, Vol.31, pp. 469-472, 1985 https://doi.org/10.1109/TIT.1985.1057074
- K. Kurosawa, 'Multi-Recipient Public-Key Encryption with Shortened Ciphertext,' Public Key Cryptography - PKC 2002, LNCS 2274, pp. 48-63, 2002
- M. Bellare, A. Boldyreva, and D. Pointcheval, 'Multi-recepient encryption schemes: Security notions and randomness re-use,' Public Key Cryptography PKC 2003, LNCS 2567, pp. 85-99, 2003
- D. Boneh and M. Franklin, 'Identity-based encryption from the weil pairing,' Advances in Cryptology Crypto 2001, LNCS 2139, pp. 213-229, 2001
- L. Chen, K. Harrison, D. Soldera, and N. P. Smart, 'Applications Multiple Trust Authorities in Pairing Based Cryptosystems,' InfraSec 2002, LNCS 2437, pp. 260-275, 2002
- N. P. Smart, 'Access Control Using Pairing Based Cryptography,' CT-RSA 2003, LNCS 2612, pp. 111-121, 2003
- C. Gentry, 'Certificate-Based Encryption and the Certificate Revocation Problem,' Advances in Cryptology - Eurocrypt 2003, LNCS 2656, pp. 272-293, 2003
- MlRACL, Multiprecision Integer and Rational Arithmetic C/C++ Library, http://indigo.ie/mscott
- D. Naor, M. Naor, and J. Lotspiech, 'Revocation and Tracing Schemes for Stateless Receivers,' Advances in Cryptology - Crypto 2001, LNCS 2139, pp.41-62, 2001
- S. S. Al-Riyami and K. G. Paterson. 'Certificateless Public Key Cryptography,' Advances in Cryptology-Asiacrypt 2003, LNCS 2894, pp. 452-473, 2003
- M. Bellare and P. Rogaway, 'Random oracles are practical: A paradigm for designing efficient protocols,' ACM CCS'93, pp. 62-73, 1993
- D. Boneh and X. Boyen, 'Efficient selective-id secure identity based encryption without random oracles,' Advances in Cryptology - Eurocrypt 2004, LNCS 3027, pp.223-238, 2004
- D. Boneh and X. Boyen, 'Short signatures without random oracles,' Advances in Cryptology - Eurocrypt 2004, LNCS 3027, pp. 56-73, 2004
- L. Chen and Z. Chen, 'Security proof of Sakai-Kashahara's identity-based encryption scheme,' Cryptography ePrint Archive, Report 2005/226, 2005
- E. Fujisaki and T. Okamoto, 'Secure integration of asymmetric and symmetric encryption schemes,' Advances in Cryptology - Crypto'99, LNCS 1666, pp.535-554, 1999