References
- A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Proc. CRYPTO, LNCS, vol. 196, 1985, pp. 47-53.
- D. Boneh and M. Franklin. "Identity Based Encryption from the Weil Pairing," Proc. CRYPTO, LNCS, vol. 2139, 2001, pp. 213-229.
- J. Sun and Y. Fang, "Cross-Domain Delegation for Sensitive Data Sharing in Distributed Electronic Health Record Systems," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 6, 2010, pp. 754-764.
- L. Yan, C.M. Rong, and G.S. Zhao, "Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography," CloudCom, LNCS, vol. 5931, 2009, pp. 167-177.
- N.P. Smart and B. Warinschi, "Identity Based Group Signatures from Hierarchical Identity-Based Encryption," Pairing, LNCS, vol. 5671, 2009, pp. 150-170.
- C. Gentry and A. Silverberg, "Hierarchical ID-Based Cryptography," Proc. ASIACRYPT, LNCS, vol. 2501, 2002, pp. 548 -566.
- D. Boneh and X. Boyen, "Efficient Selective-ID Secure Identity- Based Encryption without Random Oracles," Proc. EUROCRYPT, LNCS, vol. 3027, 2004, pp. 223-238.
- D. Boneh, X. Boyen, and E. Goh, "Hierarchical Identity Based Encryption with Constant Ciphertext," Proc. EUROCRYPT, LNCS, vol. 3494, 2005, pp. 440-456.
- J.H. Seo and J.H. Cheon, "Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts." http://eprint.iacr.org/2011/021
- J.H. Seo et al., "Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts," IEICE Trans. Fundamentals, vol. E94.A, no. 1, 2011, pp. 45-56.
- X.M. Hu, S.T. Huang, and X. Fan, "Practical Hierarchical Identity Based Encryption Scheme without Random Oracles," IEICE Trans. Fundamentals Electron. Commun. Comput. Sci., E92.A, no. 6, June 2009, pp. 1494-1499.
- B. Waters, "Efficient Identity-Based Encryption without Random Oracles," Proc. EUROCRYPT, LNCS, vol. 3494, 2005, pp. 114- 127.
- B. Waters, "Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions," Proc. CRYPTO, LNCS, vol. 5677, 2009, pp. 619-636.
- A. Lewko and B. Waters, "New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts," Proc. TCC, LNCS, vol. 5978, 2010, pp. 455-479.
- Y.L. Ren and D.W. Gu. "Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model," Informatica, vol. 32, no. 2, 2008, pp. 207-211
- X. Wang and X. Yang, "Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model," Cryptology ePrint Archive, Report 2010/113, 2010.
- D. Cash, D. Hofheinz, and E. Kiltz, "How to Delegate a Lattice Basis," Cryptology ePrint Archive, Report 2009/351 (2009). http://eprint.iacr.org/
- S. Agrawal, D. Boneh, and X. Boyen, "Efficient Lattice (H)IBE in the Standard Model," Proc. EUROCRYPT, LNCS, vol. 6110, 2010, pp. 553-572
Cited by
- New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing vol.7, pp.5, 2012, https://doi.org/10.3837/tiis.2013.05.023
- ID-Based Optimistic Fair Exchange Scheme Based on RSA vol.36, pp.4, 2012, https://doi.org/10.4218/etrij.14.0113.0351
- Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys vol.59, pp.4, 2012, https://doi.org/10.1093/comjnl/bxv059