[1] 曾梦岐,卿昱,谭平璋,等.基于身份的加密体制研究综述[J].计算机应用研究,2010,27(1):27-31. [2] SHAMIR A.Identity-based cryptosystems and signature schemes[C]//Proceedings of Workshop on the Theory and Application of Cryptographic Techniques.Berlin,Germany:Springer,1984:47-53. [3] MCCULLAGH N.Securing E-mail with identity-based encryption[J].IT Professional,2005,7(3):63-64. [4] DAN B,FRANKLIN M.Identity-based encryption from the Weil pairing[C]//Proceedings of Annual International Cryptology Conference.Berlin,Germany:Springer,2001:213-229. [5] SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:457-473. [6] DAN B,BOYEN X.Efficient selective-ID secure identity-based encryption without random Oracles[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2004:223-238. [7] WATERS B.Efficient identity-based encryption without random Oracles[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:114-127. [8] 陈辉焱,刘乐,张晨晨.一种具有CDH问题安全性基于身份的签名方案[J].计算机工程,2018,44(4):174-180. [9] MA Sha.Identity-based encryption with outsourced equality test in cloud computing[J].Information Sciences an International Journal,2016,328(C):389-402. [10] TANG Qiang.Towards public key encryption scheme supporting equality test with fine-grained authori-zation[C]//Proceedings of Australasian Conference on Information Security and Privacy.Berlin,Germany:Springer,2011:289-406. [11] YANG Guomin,TAN C H,HUANG Qiong,et al.Probabilistic public key encryption with equality test[C]//Proceedings of Cryptographers' Track at the RSA Conference.Berlin,Germany:Springer,2010:119-131. [12] LEE H T,LING S,SEO J H,et al.Semi-generic construction of public key encryption and identity-based encryption with equality test[J].Information Sciences,2016,373(C):419-440. [13] WU Libing,ZHANG Yubo,CHOO K K R,et al.Efficient and secure identity-based encryption scheme with equality test in cloud computing[J].Future Generation Computer Systems,2017,73(C):22-31. [14] 吴黎兵,张宇波,何德彪.云计算中基于身份的双服务器密文等值判定协议[J].计算机研究与发展,2017,54(10):2232-2243. [15] TANG Qiang.Public key encryption schemes supporting equality test with authorisation of different granularity[J].International Journal of Applied Cryptography,2017,2(4):304-321. [16] 计海萍,徐磊,蔚晓玲,等.云计算环境下基于身份的分层加密管理系统研究[J].信息网络安全,2016,16(5):30-36. |