2. Boneh D, Franklin M. Identity based encryption from the weil pairing. Advances in Cryptology. Proceedings of the 21st Annual International Cryptology Conference (Crypto’01), Aug 19-23, 2001, Santa Barbara, CA, USA. LNCS 2139. Berlin, Germany: Springer-Verlag, 2001: 213-229
3. Gentry C. Practical identity-based encryption without random oracles. Advances in Cryptology. Proceedings of the 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt’06), May 28-Jun 1, 2006, Saint Petersburg, Russia. LNCS 4404. Berlin, Germany: Springer-Verlag, 2006: 445-464
4. Ming Y, Shen X, Wang Y. Identity-based encryption with wildcards in the standard model. The Journal of China Universities of Posts and Telecommunications, 2009, 16 (1): 64-68
5. Zheng Y, Wang H, Wang R. Grid authentication from identity-based cryptography without random oracles. The Journal of China Universities of Posts and Telecommunications, 2008, 15 (4): 55-59
6. Gentry C, Silverberg A. Hierarchical ID-based cryptography. Advances in Cryptology. Proceedings of the 8th International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt’02), Dec 1-5, 2002, Queenstown, New Zealand. LNCS 2501. Berlin, Germany: Springer-Verlag, 2002: 548-566
7. Horwitz J, Lynn B. Towards hierarchical identity-based encryption. Advances in Cryptology. Proceedings of the 21st International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt’02), Apr 28-May 2, 2002, Amsterdam, Netherlands. LNCS 2332. Berlin, Germany: Springer-Verlag, 2002: 466-481
8. Boneh D, Boyen X. Efficient selective-ID secure identity based encryption without random oracles. Advances in Cryptology. Proceedings of the 23rdInternational Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt’04), May 2-6, 2004, Interlaken, Switzerland. LNCS 3027. Berlin, Germany: Springer-Verlag, 2004: 223-238
9. Boneh D, Boyen X, Goh E. Hierarchical identity based encryption with constant ciphertext. Advances in Cryptology. Proceedings of the 24thInternational Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt’05), May 22-26, 2005, Aarhus, Denmark: LNCS 3494. Berlin, Germany: Springer-Verlag, 2005: 440-456
10. Chow S S M, Hui L C K,Yiu S,et al. Secure hierarchical identity based signature and its application. Proceedings of the 6th International Conference on Information and Communications Security (ICICS’04), Oct 27-29, 2004, Malaga, Spain. LNCS 3269. Berlin, Germany: Springer-Verlag, 2004: 480-494
11. Lin J, Zhang F G, Wang Y M. A new hierarchical ID-based cryptosystem and CCA-secure PKE. Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC’04), Aug 1-4, 2006, Seoul, Korea. LNCS 4097. Berlin, Germany: Springer-Verlag, 2006: 362-371
12. Au M H, Liu J K, Yuen T H, et al. Practical hierarchical identity based encryption and signature schemes without random oracles. Cryptology ePrint Archive, 2006(368)
13. Yuen T H, Wei V K. Constant-size hierarchical identity-based signature /signcryption without random oracles. Cryptology ePrint Archive, 2005(412)
14. Au M H, Liu J K, Yuen T H, et al. Efficient hierarchical identity based signature in the standard model. Cryptology ePrint Archive, 2007(068)
15. Zhang L Y, Hu Y P, Wu Q. New construction of short hierarchical ID-based signature in the standard model. Fundamenta Informaticae, 2009, 90(1/2): 191-201
16. Boneh D, Boyen X. Short signature without random oracles. Advances in Cryptology. Proceedings of the 23rdInternational Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt’04), May 2-6, 2004, Interlaken, Switzerland. LNCS 3027. Berlin, Germany: Springer-Verlag, 2004: 56-73 |