References
- J. Baek, R. Safavi-Naini, and W. Susilo, 'Efficient multi-receiver identity-based encryption and its application to broadcast encryption,' Public Key Cryptography - PKC 2005, LNCS 3386, pp. 380-397, 2005
- M. Bellare, A. Boldyreva, and D. Pointcheval, 'Multi-recepient encryption schemes: Security notions and randomness re-use,' Public Key Cryptography PKC 2003, LNCS 2567, pp. 85-99, 2003
- K. Kurosawa, 'Multi-Recipient Public-Key Encryption with Shortened Ciphertext,' Public Key Cryptography - PKC 2002, LNCS 2274, pp. 48-63, 2002
- O. Baudron, D. Pointcheval, and J. Stern, 'Exteded Notions of Security for Multicast Public Key Cryptosystems,' In ICALP 2000, LNCS 1853, pp. 499-511, 2000
- M. Bellare, A. Boldyreva, and S. Micali, 'Public-key encryption in a multi-user setting: Security proofs and improvements,' Advances in Cryptology - Eurocrypt 2000, LNCS 1807, pp. 259-274, 2000
- A. Shamir, 'Identity-based cryptosystems and signature schemes,' Advances in Cryptology - Crypto 1984, LNCS 196, pp. 47-53, 1985
- D. Boneh and M. Franklin, 'Identity-based encryption from the weil paring,' Advances in Cryptology Crypto 2001 , LNCS 2139, pp. 213-229, 2001
- Y. Dodis and N. Fazio, 'Public Key Broadcast Encryption for Stateless Receivers,' ACM-DRM, 2002
- D. Naor, M. Naor, and J. Lotspiech, 'Revocation and Tracing Schemes for Stateless Receivers,' Advances in Cryptology -Crypto2001, LNCS 2139, pp.41-62, 2001