References
- A. Fiat and M. Naor, "Broadcast encryption," in Proc. of Crypto., Lecture Notes in Computer Science, vol. 773, pp. 480-491, Berlin: Springer-Verlag, August 1993.
- Y. Dodis and N. Fazio, "Public key broadcast encryption for stateless receivers," in Proc. of ACM Workshop on Digital Rights Management, Lecture Notes in Computer Science, vol. 2696, pp. 61-80, Berlin: Springer-Verlag, November 2002.
- Y. Dodis and N. Fazio, "Public key broadcast encryption secure against adaptive chosen ciphertext attack," in Proc. of Public Key Cryptography, Lecture Notes in Computer Science, vol. 2567, pp. 100-115, Berlin: Springer-Verlag, January 2003.
- D. Boneh, C. Gentry and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proc. of CRYPTO, Lecture Notes in Computer Science, vol. 3621, pp. 258-275, Berlin: Springer-Verlag, August 2005.
- C. Delerablee, P.Paillier and D. Pointcheval, "Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys," in Proc. of Pairing-Based Cryptography, Lecture Notes in Computer Science, vol. 4575, pp. 39-59, Berlin: Springer-Verlag, July 2007.
- A. Shamir, "Identity-based Cryptosystems and Signature Schemes," in Proc. of Crypto, Lecture Notes in Computer Science, vol. 196, pp. 47-53, Berlin: Springer-Verlag, August 1984.
- D. Boneh and M. Franklin, "Identity Based Encryption from the Weil Pairing," in Proc. of CRYPTO, Lecture Notes in Computer Science, vol. 2139, pp. 213-229, Berlin: Springer-Verlag, August 2001.
- D. Boneh and X. Boyen, "Efficient Selective-ID Identity Based Encryption without Random Oracles," in Proc. of Eurocrypt, Lecture Notes in Computer Science, vol. 3027, pp. 223-238, Berlin:Springer-Verlag, 2004.
- D. Boneh and J. Katz, "Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption," in Proc. of CT-RSA, Lecture Notes in Computer Science, vol. 3376, pp. 87-103, Berlin: Springer-Verlag, February 2005.
- D. Boneh, X. Boyen and E. J. Goh, "Hierarchical Identity Based Encryption with Constant Size Ciphertext," in Proc. Of Eurocrypt, Lecture Notes in Computer Science, vol. 3494, pp. 440-456, Berlin: Springer-Verlag, May 2005.
- D. Boneh and X. Boyen, "Secure Identity Based Encryption without Random Oracles," in Proc. of Crypto, Lecture Notes in Computer Science, vol. 3152, pp. 443-459, Berlin: Springer-Verlag, August 2004.
- C. Gentry, "Practical identity-based encryption without random oracles," in Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 4004, pp. 445-464, Berlin: Springer-Verlag, 2006.
- Y. Mu et al., "Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption," in Proc. of ASIAN 2004, Lecture Notes in Computer Science, vol. 3321, pp. 169- 181, Berlin: Springer-Verlag, December 2004.
- C. Delerablee, "Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys," in Proc. of ASIACRYPT, Lecture Notes in Computer Science, vol. 4833, pp. 200-215, Berlin: Springer-Verlag, December 2007.
- X. Du et al., "An ID-Based Broadcast Encryption Scheme for Key Distribution," IEEE Transactions on Broadcasting, vol. 51, no. 2, pp. 264-266, 2005. https://doi.org/10.1109/TBC.2005.847600
- Y. L. Ren and D.W. Gu, "Fully CCA2 secure identity based broadcast encryption without random oracles," Information Processing Letters, vol. 109, no. 11, pp. 527-533, 2009. https://doi.org/10.1016/j.ipl.2009.01.017
- C. Gentry and B. Waters, "Adaptive Security in Broadcast Encryption Systems," in Proc. of EUROCRYPT 2009, LNCS 5479, pp. 171-188, 2009.
- L. Hu and Z. Liu, "Efficient Identity-based Broadcast Encryption without Random Oracles," Journal of Computers, vol. 5, no. 3, pp. 331-336, 2010.
- X.Zhao and F. Zhang, "Analysis on Hu et al's Identity-based Broadcast Encryption," International Journal of Network Security, (Will appear in vol.12, no. 3, pp. 362-364, 2011) http://ijns.femto.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p178-180.pdf.
- R. Canetti, S. Halevi and J. Katz, "Chosen-Ciphertext Security from Identity- Based Encryption," in Proc. of Eurocrypt, Lecture Notes in Computer Science, vol. 3027, pp. 207-222, Berlin: Springer-Verlag, May 2004.
Cited by
- Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication vol.2021, pp.None, 2011, https://doi.org/10.1155/2021/5599996