[1]
Shamir A. Identity-based Cryptosystems and Signature Schemes. Advances in Cryptology-CRYPTO, Edited by G. R. Blakley, David Chaum, Berlin, Springer press, LNCS, vol. 196, pp.47-53(1984).
DOI: 10.1007/3-540-39568-7_5
Google Scholar
[2]
Li C T, Hwang M. S. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and computer applications, 33(1), pp.1-5( 2010).
DOI: 10.1016/j.jnca.2009.08.001
Google Scholar
[3]
Sahai A., Waters B. Fuzzy Identity-Based Encryption. Advances in Cryptology- EUROCRYPT, Berlin, Springer press , LNCS, vol. 3494, pp.457-473(2005).
DOI: 10.1007/11426639_27
Google Scholar
[4]
V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained accesscontrol of encrypted data, Proc. of CCS, New York, ACM Press, pp.221-238(2006).
DOI: 10.1145/1180405.1180418
Google Scholar
[5]
M. Pirretti, P. Traynor, P. McDaniel, B. Waters, Secure Attribute-Based Systems, Proc. of ACMCCS'06, ACM, pp.99-112(2006).
DOI: 10.1145/1180405.1180419
Google Scholar
[6]
J. Baek, W. Susilo, J. Zhou, New constructions of fuzzy identity-based encryption, Proc. of the 2nd ACM Symposium on Information, Computer and Communications Security, New York, ACM press, NY, pp.368-370(2007).
DOI: 10.1145/1229285.1229330
Google Scholar
[7]
M. Chase, Multi-authority attribute based encryption, Proc. of TCC, Berlin, Springer press, LNCS, vol. 4392, pp.515-534(2007).
Google Scholar
[8]
D. Boneh, X. Boyen, and S. Halevi. Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. In proceedings of RSA-CT '06, LNCS, vol. 3860, pp.226-243(2006 ).
DOI: 10.1007/11605805_15
Google Scholar
[9]
B. Waters, Efficient identity based encryption without random oracles, Proc. of EUROCRYP, Berlin, Springer press, LNCS, vol. 3494, pp.114-127(2005).
Google Scholar
[10]
P.Y. Yang et al., Fuzzy Identity Based Signature, Preprint submitted to Elsevier Preprint, 2008/002.
Google Scholar
[11]
C. Wang, J. Kim, Two Constructions of Fuzzy Identity Based Signature. International Conference on Biomedical Engineering and Informatics, IEEE press, pp.1-5(2009).
DOI: 10.1109/bmei.2009.5305820
Google Scholar
[12]
C. Wang, W. Chen, Y. Liu . A Fuzzy Identity Based Signature Scheme. International Conference on E-Business and Information System Security, IEEE press, pp.1-5(2009).
DOI: 10.1109/ebiss.2009.5137871
Google Scholar
[13]
L. Fan, J. Zheng and J. Yang. A Biometric Identity-based Signature Scheme in the Standard model. IEEE International Conference on Network Infrastructure and Digital Content, IEEE press, p.552 – 556 (2009).
DOI: 10.1109/icnidc.2009.5360996
Google Scholar
[14]
Kenneth G. Paterson and Jacob C.N. Schuldt: Efficient Identity-Based Signatures Secure in the Standard Model. Proc. ACISP, L. Batten and R. Safavi-Naini Eds., Berlin, Springer press, LNCS, vol. 4058, pp.207-222(2006).
Google Scholar