References
- A. Fiat, M. Naor, "Broadcast encryption," in Proc. of CRYPTO, Springer-Verlag, LNCS 773, pp. 480-491, 1994.
- H. Ghodosi, J. Pieprzyk and R. Safavi-Naini, "Dynamic threshold cryptosystems: a new scheme in group oriented cryptography," in Proc. of Pragocrypt 96, CTU Publishing House, pp. 370-379, 1996.
- A. Shamir, "Identity-based Cryptosystems and Signature Schemes," in Proc. of CRYPTO, Springer-Verlag, LNCS 196, pp. 47-53, 1984.
- D. Boneh and M. Franklin, "Identity-based encryption from the well pairing," in Proc. of CRYPTO, Springer-Verlag, LNCS 2193, pp. 213-229, 2001.
- D. Boneh and X. Boyen, "Efficient selective-id secure identity based encryption without random oracles," in Proc. of EuroCryp, Springer-Verlag, LNCS 3027, pp. 223-238, 2004,.
- C. Cocks, "An identity based encryption scheme based on quadratic residues," in Proc. of Cryptography and coding, Springer-Verlag, LNCS 2260, pp. 360-363, 2001.
- D. Boneh and J. Katz, "Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption," in Proc. of CT-RSA, Springer-Verlag, LNCS 3376, pp. 87-103, 2005.
- R. Canetti, S. Halevi, and J. Katz, "Chosen-ciphertext security from identity-based encryption," in Proc. of EuroCrypt, Springer-Verlag, LNCS 3027, pp. 207-222, 2004.
- S. Chattterjee and P. Sarkar, "Generalization of the Selectve-ID Security Model for HIBE Protocols," in Proc. of PKC, Springer-Verlag, LNCS 3958, pp. 241-256, 2006.
- Z. Chai, Z. Cao and Y. Zhou, "Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network," in Proc. of IMSCCS 06, IEEE Computer Society, Volume 2, pp. 148-154, 2006.
- V. Daza, J. Herranz and P. Morillo, "CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts," in Proc. of ProvSec 2007, Springer-Verlag, LNCS 4784, pp. 35-50, 2007.
- C. Delerablee and D. Pointcheval, "Dynamic Threshold Public-Key Encryption," in Proc. of CRYPTO, Springer-Verlag, LNCS 5157, pp. 317-334, 2008.
Cited by
- Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks vol.7, pp.1, 2013, https://doi.org/10.1109/jsyst.2012.2188689
- Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication vol.2021, pp.None, 2010, https://doi.org/10.1155/2021/5599996