参考文献[1]Fiat A,Naor M.Broadcast Encryption[C]//Proceedings of CRYPTO’93.Berlin,German:Springer,1993:480-491. [2]Boneh D,Gentry C.Collusion Resistant Broadcast Encryp-tion with Short Ciphertexts and Private Keys[C]//Proceedings of CRYPTO’05.Washington D.C.,USA:IEEE Press,2005:258-275. [3]Delerablee C.Identity-based Broadcast Encryption with Cosntant Size Ciphertexts and Private Keys[C]//Proceedings of IEEE ASIACRYPT’07.Washington D.C.,USA:IEEE Press,2005:200-215. [4]Barth A,Boneh D,Waters B.Privacy in Encrypted Con-tent Distribution Using Private Broadcast Encryp-tion [C]//Proceedings of IEEE CRYPTO’06.Berlin,Germany:Springer,2006:215-222. [5]Fan C,Huang L,Ho P.Anonymous Multi-receiver Identity-based Encryption[J].IEEE Transactions on Computers,2010,59(9):1239-1249. [6]Wang H,Zhang Y,Xiong H,et al.Cryptanalysis and Improvements of an Anonymous Multi-receiver Identity-based Encryption Scheme[J].IET Information Security,2012,6(1):20-27. [7]Zhang J,Xu Y.Comment on Anonymous Multi-receiver Identity-based Encryption Scheme[C]//Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems.Washington D.C.,USA:IEEE Press,2012:473-476. [8]Hur J,Park C,Hwang S O.Privacy-preserving Identity-based Broadcast Encryption[J].Information Fusion,2012,13(1):296-303. [9]谭红杨,李红娟.具有隐私性保护的基于身份的多接收者加密方案[J].科学技术与工程,2013,35(13):685-690. [10]杨坤伟,李顺东.一种基于身份的匿名广播加密方案[J].计算机工程,2014,40(7):97-101. [11]Kate A,Zaverucha G,Goldberg I.Pairing-based Onion Routing[C]//Proceedings of Privacy Enhancing Technologies Symposium.Washington D.C.,USA:IEEE Press,2007:95-112. [12]Baek J,Zheng Y.Identity-based Threshold Signature from the Bilinear Pairings[C]//Proceedings of ITCC’04.Washington D.C.,USA:IEEE Press,2004:124-128. 编辑索书志 |