Identity-Based Threshold Decryption, PKC 2004, pp.262-276, 2004. ,
DOI : 10.1007/978-3-540-24632-9_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1878
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, EUROCRYPT 2004, pp.223-238, 2004. ,
DOI : 10.1007/978-3-540-24676-3_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5446
Hierarchical Identity Based Encryption with Constant Size Ciphertext, EUROCRYPT 2005, pp.440-456, 2005. ,
DOI : 10.1007/11426639_26
URL : http://ai.stanford.edu/~xb/eurocrypt05a/eurocrypt05tinyhibe.ps
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles, CT-RSA 2006, pp.226-243, 2006. ,
DOI : 10.1007/11605805_15
URL : http://ai.stanford.edu/~xb/ctrsa06/threshold.ps
Identity-based encryption from the Weil pairing, CRYPTO 2001, pp.213-229, 2001. ,
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, CRYPTO 2005, pp.258-275, 2005. ,
DOI : 10.1007/11535218_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.329.5787
An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract), EUROCRYPT '99, pp.90-106, 1999. ,
DOI : 10.1007/3-540-48910-X_7
Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), pp.148-154, 2006. ,
DOI : 10.1109/IMSCCS.2006.217
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts, ProvSec 2007, pp.35-50, 2007. ,
DOI : 10.1007/978-3-540-75670-5_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.3475
How to share a function securely, Proceedings of the twenty-sixth annual ACM symposium on Theory of computing , STOC '94, pp.522-533, 1994. ,
DOI : 10.1145/195058.195405
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, ASIACRYPT 2007, pp.200-215, 2007. ,
DOI : 10.1007/978-3-540-76900-2_12
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys, Pairing 2007, pp.39-59, 2007. ,
DOI : 10.1007/978-3-540-73489-5_4
Threshold cryptosystems, CRYPTO '89, pp.307-315, 1990. ,
DOI : 10.1007/3-540-57220-1_47
Broadcast Encryption, CRYPTO '93, pp.480-491, 1994. ,
DOI : 10.1007/3-540-48329-2_40
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, CRYPTO '86, pp.186-194, 1987. ,
DOI : 10.1007/3-540-47721-7_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.8796
A Practical Protocol for Large Group Oriented Networks, EUROCRYPT '89, pp.56-61, 1990. ,
DOI : 10.1007/3-540-46885-4_8
Threshold RSA for Dynamic and Ad-Hoc Groups, EUROCRYPT 2008, pp.88-107, 2008. ,
DOI : 10.1007/978-3-540-78967-3_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.8882
Dynamic threshold cryptosystems: A new scheme in group oriented cryptography, PRAGOCRYPT '96, pp.370-379, 1996. ,
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : http://doi.org/10.1016/0022-0000(84)90070-9
Efficient tree-based revocation in groups of low-state devices, CRYPTO 2004, pp.511-527, 2004. ,
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
The LSD Broadcast Encryption Scheme, CRYPTO 2002, pp.47-60, 2002. ,
DOI : 10.1007/3-540-45708-9_4
A one-round protocol for tripartite diffie-hellman, ANTS, pp.385-394, 2000. ,
Efficient revocation and threshold pairing based cryptosystems, Proceedings of the twenty-second annual symposium on Principles of distributed computing , PODC '03, pp.163-171, 2003. ,
DOI : 10.1145/872035.872059
Revocation and Tracing Schemes for Stateless Receivers, CRYPTO 2001, pp.41-62, 2001. ,
DOI : 10.1007/3-540-44647-8_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.8970
On cryptographic assumptions and challenges (invited talk, CRYPTO 2003, pp.96-109, 2003. ,
DOI : 10.1007/978-3-540-45146-4_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.9911
Public-key cryptosystems provably secure against chosen ciphertext attacks, Proceedings of the twenty-second annual ACM symposium on Theory of computing , STOC '90, 1990. ,
DOI : 10.1145/100216.100273
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.5883
Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, vol.13, issue.3, pp.361-396, 2000. ,
DOI : 10.1007/s001450010003
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, CRYPTO '91, pp.433-444, 1992. ,
DOI : 10.1007/3-540-46766-1_35
Efficient identification and signatures for smart cards, CRYPTO '89, pp.239-252, 1990. ,
Lower Bounds for Discrete Logarithms and Related Problems, EUROCRYPT '97, pp.256-266, 1997. ,
DOI : 10.1007/3-540-69053-0_18
ISO 18033-2: An emerging standard for public-key encryption, 2004. ,
Securing threshold cryptosystems against chosen ciphertext attack, EUROCRYPT '98, pp.1-16, 1998. ,