Citation: | PANG Liaojun, GAO Lu, PEI Qingqi, GUI Jingjing, WANG Yumin. A New ID-based Multi-Recipient Public-key Encryption Scheme[J]. Chinese Journal of Electronics, 2013, 22(1): 89-92. |
M. Bellare, A. Boldyreva, S. Micali, “Public-key encryption in amulti-user setting: security proofs and improvements”, Proc. ofthe International Conference on the Theory and Application ofCryptographic Techniques, Bruges, Belgium, pp.259-274, 2000.
|
O. Baudron, D. Pointcheval, J. Stern, “Extended notions of securityfor multicast public key cryptosystems”, Proc. of the Automata,Languages and Programming 27th International Colloquium,Geneva, Switzerland, pp.499-511, 2000.
|
L. Lu, L. Hu, “Multi-recipient public key encryption schemebased on Weil Pairing”, Journal of Software, Vol.19, No.8,pp.2159-2166, 2008.
|
L. Pang, H. Li, L. Jiao, Y. Wang, “Design and analysis of aprovable secure multi-recipient public key encryption scheme”,Journal of Software, Vol.20, No.10, pp.2907-2914, 2009.
|
H. Cheng, C. Rong, Z. Tan, Q. Zeng, “Identity based encryptionand biometric authentication scheme for secure data accessin cloud computing”, Chinese Journal of Electronics, Vol.21,No.2, pp.154-259, 2012.
|
H. Qin, Y. Dai, Z. Wang, “Identity-based multi-receiver thresholdsigncryption scheme”, Security and Communication Networks,Vol.4, No.11, pp.1331-1337, 2011.
|
C.I. Fan, L.Y. Huang, P.H. Ho, “Anonymous multireceiveridentity-based encryption”, IEEE Transactions on Computers,Vol.59, No.9, pp.1239-1249, 2010.
|
B. Zhang, Q. Xu, “An ID-based anonymous signcryption schemefor multiple receivers secure in the standard model”, Proc. ofthe Advances in Computer Science and Information Technology,Miyazaki, Japan, pp.15-27, 2010.
|
L. Pang, H. Li, Q. Pei, “Improved multicast key managementof Chinese wireless local area network security standard”, IETCommunications, Vol.6, No.9, pp.1126-1130, 2012.
|
J. Baek, S.N. Reihaneh, W. Susilo, “Efficient multi-receiveridentity-based encryption and its application to broadcast encryption”,Proc. of the 8th International Workshop on Theoryand Practice in Public Key Cryptography, Les Diablerets,Switzerland, pp.380-397, 2005.
|
T. Okamoto, D. Pointcheval, “REACT: Rapid enhancedsecurityasymmetric cryptosystem transform”, Proc. of Topicsin Cryptology at RSA Conference, San Francisco, CA, USA,pp.159-174, 2001.
|