Society and Group Oriented Cryptography: a New Concept, Advances in Cryptology, CRYPTO'87, pp.120-127, 1987. ,
DOI : 10.1007/3-540-48184-2_8
Certificate-Based Encryption and the Certificate Revocation Problem, Lecture Notes in Computer Science, vol.2656, pp.272-293, 2003. ,
DOI : 10.1007/3-540-39200-9_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.2805
A Certificate-Based Signature Scheme, Lecture Notes in Computer Science, vol.2964, pp.99-111, 2004. ,
DOI : 10.1007/978-3-540-24660-2_8
Identity-Based Threshold Decryption, Proceedings of PKC'04, pp.262-276, 2004. ,
DOI : 10.1007/978-3-540-24632-9_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1878
ID-based threshold decryption secure against adaptive chosen-ciphertext attack, Computers & Electrical Engineering, vol.33, issue.3, pp.166-176, 2007. ,
DOI : 10.1016/j.compeleceng.2006.11.003
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks, Computer Communications, vol.32, issue.17, pp.1829-1836, 2009. ,
DOI : 10.1016/j.comcom.2009.07.005
A general threshold encryption scheme based on new secret sharing measure, 2011 6th IEEE Conference on Industrial Electronics and Applications, pp.21-23, 2011. ,
DOI : 10.1109/ICIEA.2011.5975962
General Group Oriented ID-Based Cryptosystems with Chosen Plaintext Security, International Journal of Network Security, vol.6, issue.1, pp.1-5, 2008. ,
A Secret Sharing Scheme with General Access Structures and its Applications, International Journal of Advancements in Computing Technology, vol.3, issue.4, pp.121-128, 2011. ,
Construction of Dynamic Threshold Decryption Scheme from Pairing, International Journal of Network Security, vol.2, issue.2, pp.111-113, 2006. ,
ID based cryptosystems with pairing on elliptic curve, Cryptology ePrint Archive Report, p.54, 2003. ,
Secure Integration of Asymmetric and Symmetric Encryption Schemes, Proceedings of CRYPTO '99, pp.537-554, 1999. ,
DOI : 10.1007/3-540-48405-1_34
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.5980
PBC Library Specification ,
Certificateless Public Key Cryptography, Advances in Cryptology -AsiaCrypt, pp.452-473, 2003. ,
DOI : 10.1007/978-3-540-40061-5_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Proceedings of Advances in Cryptology ? Eurocrypt 2004, pp.223-238, 2004. ,
DOI : 10.1007/978-3-540-24676-3_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5446
Security proof of Sakai-Kasahar's identity-based encryption scheme, Proceedings of Cryptography and Coding 2005, pp.442-459, 2005. ,
DOI : 10.1007/11586821_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3315
Extensions of access structures and their cryptographic applications, Applicable Algebra in Engineering, Communication and Computing, vol.32, issue.3, pp.257-284, 2010. ,
DOI : 10.1007/s00200-010-0125-1
How to (Really) Share a Secret, Advances in Cryptology -CRYPTO 88, pp.390-448, 1990. ,
DOI : 10.1007/0-387-34799-2_30
Generalized secret sharing and monotone functions Advances in Cryptology -CRYPTO '88, LCNS No 403, pp.27-35, 1990. ,
DOI : 10.1007/0-387-34799-2_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.698.1352
Reusing Shares in Secret Sharing Schemes, The Computer Journal, vol.37, issue.3, pp.199-205, 1994. ,
DOI : 10.1093/comjnl/37.3.199
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.1444
Cryptanalysis of a Dynamic Threshold Decryption Scheme, Communications of the Korean Mathematical Society, vol.24, issue.1, pp.153-159, 2009. ,