References
1. Fiat A, Naor M. Broadcast encryption. International Cryptology Conference, 1993, 35(8): 480 -491
2. Dan B, Gentry C, Waters B. Collusion resistant broadcast encryption with short cipher-texts and private keys. International Cryptology Conference, 2005, 3621: 258 -275
3. Gentry C, Waters B. Adaptive security in broadcast encryption systems (with short cipher-texts). Computer Science Bibliography, 2009, 5479: 171 -188
4. Wu Q, Qin B, Zhang L, et al. Contributory broadcast encryption with efficient encryption and short cipher-texts. IEEE Transactions on Computers, 2016, 65(2): 466 -479
5. Susilo W, Plantard T, Liang K, et al. Broadcast encryption with dealership. International Journal of Information Security, 2016, 15(3): 1 -13
6. Rao Y S, Dutta R. Computational friendly attribute-based encryptions with short cipher-text. Theoretical Computer Science, 2017, 668: 1 -26
7. Li J, Yu Q, Zhang Y. Identity-based broadcast encryption with continuous leakage resilience. Information Sciences, 2017, 429
8. Canard S, Phan H, Pointcheval D, et al. A new technique for compacting cipher-text in multi-channel broadcast encryption and attribute-based encryption. Theoretical Computer Science, 2018, 723(2): 51 -72
9. Gentry C, Silverberg A. Hierarchical ID-based cryptography. International Conference on the Theory and Application of Cryptology and Information Security, 2002, 82(4): 548 -566
10. Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles. Proc of Eurocrypt, 2004(4): 223 -238
11. Boyen X, Waters B. Anonymous hierarchical identity-based encryption (without random oracles). International Conference on Advances in Cryptology, 2006, 4117(4): 290 -307
12. Gentry C, Halevi S. Hierarchical identity based encryption with polynomially many levels. Theory of Cryptography Conference, 2009, 5444: 437 -456
13. Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions International Cryptology Conference on Advances in Cryptology, 2009, 5677: 619 -636
14. Cash D, Hofheinz D, Kiltz E, et al. Bonsai trees, or how to delegate a lattice basis. Journal of Cryptology, 2012, 25 (4): 601 -639
15. Agrawal S, Dan B, Boyen X. Efficient lattice (H) IBE in the standard model. Computer Science Bibliography, 2010, 6110: 553 -572
16. Zhang J, Chen Y, Zhang Z. Programmable Hash functions from lattices: short signatures and IBEs with small key sizes. Proc of CRYPTO, 2016: 303 -332
17. Ye Q, Hu M X, Tang Y L, et al. Novel hierarchical identity-based encryption scheme from lattice. Journal on Communications, 2017, 38(11): 54 -64
18. Agrawal S, Dan B, Boyen X. Lattice basis delegation in fixed dimension and shorter-cipher-text hierarchical IBE. Cryptology Conference, Santa Barbara, CA, USA, 2010, 17(17): 98 -115
19. Micciancio D, Peikert C. Trapdoors for lattices: simpler, tighter, faster, smaller. International Conference on the Theory and Applications of Cryptographic Techniques, 2012, 7237(2011): 700 -718
20. Dowlin N, Ran G B, Laine K, et al. Manual for using homomorphic encryption for bioinformatics. Proceedings of the IEEE, 2017, 105(3): 552 -567
21. Abdalla M, Fouque P A, Lyubashevsky V, et al. Tightly secure signatures from lossy identification schemes. Journal of Cryptology, 2016, 29(3): 597 -631
22. Mukherjee P, Wichs D. Two round multiparty computation via multi-key FHE. International Conference on Springer-Verlag New York, 2016: 735 -763
23. Boneh D, Hamburg M. Generalized identity based and broadcast encryption schemes. International Conference on Advances in Cryptology-Asiacrypt, 2008, 5350: 455 -470
24. Cash D, Hofheinz D, Kiltz E. How to delegate a lattice basis. Manuscript, 2009, 25(4): 601 -639
25. Liu W, Liu J, Wu Q, et al. Practical chosen-cipher-text secure hierarchical identity-based broadcast encryption. International Journal of Information Security, 2016, 15(1): 35 -50
26. Zhang J M, Qin C. Hierarchical identity-based broadcast encryption scheme on lattices. Information Security and Privacy, 2012, 8544: 242 -257
27. Yang C, Zheng S, Wang L, et al. Hierarchical identity-based broadcast encryption scheme from LWE. Journal of Communications and Networks, 2014, 16(3): 258 -260
28. Wang J, Bi J. Lattice-based identity-based broadcast encryption scheme, 2010
29. Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions. STOC'08, 2008: 197 -206 |