[1]Fiat A, Naor M. Broadcast encryption[C] Proc of Annual Int Cryptology Conf. Berlin: Springer, 1993: 480491[2]Baek J, SafaviNaini R, Susilo W. Efficient multireceiver identitybased encryption and its application to broadcast encryption[C] Proc of Int Workshop on Public Key Cryptography. Berlin: Springer, 2005: 380397[3]Shamir A. Identitybased cryptosystems and signature schemes[C] Proc of Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1984: 4753[4]Boneh D, Franklin M. Identitybased encryption from the Weil pairing[C] Proc of Annual Int Cryptology Conf. Berlin: Springer, 2001: 213229[5]Delerablée C. Identitybased broadcast encryption with constant size ciphertexts and private keys[C] Proc of Int Conf on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2007: 200215[6]Sakai R, Furukawa J. Identitybased broadcast encryption[J]. IACR Cryptology ePrint Archive, 2007, 2007: 217[7]Bellare M, Boldyreva A, Desai A, et al. Keyprivacy in publickey encryption[C] Proc of Int Conf on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2001: 566582[8]Hur J, Park C, Hwang S O. Privacypreserving identitybased broadcast encryption[J]. Information Fusion, 2012, 13(4): 296303[9]Zhang Leyou, Wu Qing, Mu Y. Anonymous identitybased broadcast encryption with adaptive security[C] Proc of Int Symp on Cyberspace Safety and Security. Cham, Switzerland: Springer, 2013: 258271[10]Zhang Mingwu, Takagi T. Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group email systems with privacy preservation[J]. IEEE Systems Journal, 2012, 7(3): 410419[11]Ren Yanli, Niu Zhihua, Zhang Xinpeng. Fully anonymous identitybased broadcast encryption without random oracles[J]. International Journal of Network Security, 2014, 16(4): 256264[12]Xie Li, Ren Yanli. Efficient anonymous identitybased broadcast encryption without random oracles[J]. International Journal of Digital Crime and Forensics, 2014, 6(2): 4051[13]Fan ChunI, Tseng YiFan. Anonymous multireceiver identitybased authenticated encryption with CCA security[J]. Symmetry, 2015, 7(4): 18561881[14]Xu Peng, Li Jingnan, Wang Wei, et al. Anonymous identitybased broadcast encryption with constant decryption complexity and strong security[C] Proc of the 11th ACM on Asia Conf on Computer and Communications Security. New York: ACM, 2016: 223233[15]He Kai, Weng Jian, Liu Jianan, et al. Anonymous identitybased broadcast encryption with chosenciphertext security[C] Proc of the 11th ACM on Asia Conf on Computer and Communications Security. New York: ACM, 2016: 247255[16]He Kai, Weng Jian, Au Man Ho, et al. Generic anonymous identitybased broadcast encryption with chosenciphertext security[G] LNCS 9723: Proc of Australasian Conf on Information Security and Privacy. Berlin: Springer, 2016: 207222[17]Ming Yang, Yuan Hongping. Fully secure anonymous identity based broadcast encryption with group of prime order[J]. International Journal of Network Security, 2019, 21(1): 716[18]Tseng YiFan, Fan ChunI. Anonymous multireceiver identitybased encryption against chosenciphertext attacks with tight reduction in the standard model[J]. Security and Communication Networks, 2021, 2021:111[19]袁峰, 程朝辉. SM9标识密码算法综述[J]. 信息安全研究, 2016, 2(11): 10081027[20]赖建昌, 黄欣沂, 何德彪. 一种基于商密SM9的高效标识广播加密方案[J]. 计算机学报, 2021, 44(5): 897907[21]Cheng Zhaohui. Security analysis of SM9 key agreement and encryption[C] Proc of Int Conf on Information Security and Cryptology. Berlin: Springer, 2018: 325[22]刘潇, 刘魏然, 伍前红, 等. 选择密文安全的基于身份的广播加密方案[J]. 密码学报, 2015, 2(1): 6676
|