1. Braun T, Fung B C M, Iqbal F, et al. Security and privacy challenges in smart cities. Sustainable Cities and Society, 2018, 39: 499–507
2. Fiat A, Naor M. Broadcast encryption. Advances in Cryptology: Proceedings of the 13th Annual International Cryptology Conference (Crypto'93), Aug 22-26, 1993, Santa Barbara, CA, USA. LNCS 773. Berlin, Germany: Springer-Verlag, 1993: 480–491
3. Lubicz D, Sirvent T. Attribute-based broadcast encryption scheme made efficient. Progress in Cryptology: Proceedings of the 2008 International Conference on Cryptology in Africa (AFRICACRYPT’08), Jun 11-14, 2008, Casablanca, Morocco. LNCS 5023. Berlin, Germany: Springer-Verlag, 2008: 325–342
4. Li Q Y, Zhang F L. A fully secure attribute-based broadcast encryption scheme. International Journal of Network Security, 2015, 17(3): 263–271
5. Delerablée C. Identity-based broadcast encryption with constant size ciphertexts and private keys. Advances in Crypotology: Proceedings of the 13th International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT’07), Dec 2-6, 2007, Kuching, Malaysia. LNCS 4833. Berlin, Germany: Springer-Verlag, 2007: 200–215
6. Sakai R, Furukawa J. Identity-based broadcast encryption. Journal of Electronics and Information Technology, 2008, 33(4): 1047–1050
7. Ramanna S C, Sarkar P. Efficient adaptively secure IBBE from the SXDH assumption. IEEE Transactions on Information Theory, 2016, 62(10): 5709–5726
8. Park S, Lee K, Dong H L. New constructions of revocable identity-based encryption from multilinear maps. IEEE Transactions on Information Forensics and Security, 2015, 10(8): 1564–1577
9. Attrapadung N, Imai H. Conjunctive broadcast and attribute-based encryption. Pairing-Based Cryptography: Proceedings of the 3rd International Conference on Pairing-Based Cryptography (Pairing’09), Aug 12-14, 2009, Palo Alto, CA, USA. LNCS 5671. Berlin, Germany: Springer-Verlag, 2009: 248–265
10. Zhou Z B, Huang D, Wang Z J. Efficient privacy-preserving ciphertext-policy attribute-based encryption and broadcast encryption. IEEE Transactions on Computers, 2014, 64(1): 126–138
11. Wesolowski B, Junod P. Ciphertext-policy attribute-based broadcast encryption with small keys. Information Security and Cryptology: Proceedings of the 2015 Information Security and Cryptology (ICISC’15), Nov 25-27, 2015, Seoul, Republic of Korea. LNCS 9558. Berlin, Germany: Springer-Verlag, 2015: 53–68
12. Canard S, Phan D H, Trinh V C. Attribute-based broadcast encryption scheme for lightweight devices. IET Information Security, 2018, 12(1): 52–59
13. He K, Weng J, Liu J N, et al. Anonymous identity-based broadcast encryption with chosen-ciphertext security. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (AISA CCS’16), May 30-Jun 3, Xi’an, China. New York, NY, USA: ACM, 2016: 247–255
14. Lai J C, Mu Y, Guo F C, et al. Fully privacy-preserving and revocable id-based broadcast encryption for data access control in smart city. Personal and Ubiquitous Computing, 2017, 21(9): 1–14
15. Sahai A, Waters B. Fuzzy identity-based encryption. Advances in Cryptology: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '05), May 22-26, 2005, Aarhus, Denmark. LNCS 3494. Berlin, Germany: Springer-Verlag, 2005: 457–473
16. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy, May 20-23, 2007, Berkeley, CA, USA. Washington, DC, USA: IEEE Computer Society, 2007: 321–334
17. Lewko A, Waters B. Decentralizing attribute-based encryption. Advances in Cryptology: Proceedings of the 30th Annual International Conference on Theory and Applications Of Cryptographic Techniques (EUROCRYPT’11), May 15-19, 2010, Tallinn, Estonia. LNCS 6632. Berlin, Germany: Springer-Verlag, 2010: 568–588
18. Hohenberger S, Waters B. Attribute-based encryption with fast decryption. Public-Key Cryptography: Proceedings of 16th International Workshop on Public-Key Cryptography (PKC’13), Feb 26-Mar 1, 2013, Nara, Japan. LNCS 7778. Berlin, Germany: Springer-Verlag, 2013: 162–179
19. Lai J Z, Deng R H, Guan C W, et al. Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 2013, 8(8): 1343–1354
20. Han J G, Susilo W, Mu Y, et al. Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Transactions on Information Forensics and Security, 2015, 10(3): 665–678.
21. Zhang L Y, Yin H J. Recipient anonymous ciphertext-policy attribute-based broadcast encryption. International Journal of Network Security, 2018, 20(1): 168–176
22. Waters B. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. Advances in Cryptology: Proceedings of the 29th Annual International Cryptology Conference (CRYPTO’09), Aug 16-20, 2009, Santa Barbara, CA, USA. LNCS 5677. Berlin, Germany: Springer-Verlag, 2009: 619–636
|