[1]
Shamir A. Identity-based Cryptosystems and Signature Schemes. G. R. Blakley, David Chaum (Eds. ): Advances in Cryptology-CRYPTO, Springer-Verlag, 1984, vol. 196 of LNCS, pp.47-53.
DOI: 10.1007/3-540-39568-7_5
Google Scholar
[2]
Li C T, Hwang M. S. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and computer applications, 2010, 33(1): 1-5.
DOI: 10.1016/j.jnca.2009.08.001
Google Scholar
[3]
Sahai A., Waters B. Fuzzy Identity-Based Encryption. Ronald Cramer(Eds. ): Advances in Cryptology- EUROCRYPT, Springer-Verlag, 2005, vol. 3494 of LNCS, pp.457-473.
DOI: 10.1007/11426639_27
Google Scholar
[4]
V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained accesscontrol of encrypted data, Proc. of CCS, 89-98, New York, ACM Press, 2006, pp.221-238.
DOI: 10.1145/1180405.1180418
Google Scholar
[5]
M. Pirretti, P. Traynor, P. McDaniel, B. Waters, Secure Attribute-Based Systems, Proc. of ACMCCS'06, ACM, 2006, pp.99-112.
DOI: 10.1145/1180405.1180419
Google Scholar
[6]
J. Baek, W. Susilo, J. Zhou, New constructions of fuzzy identity-based encryption, Proc. of the2nd ACM Symposium on Information, Computer and Communications Security, ACM New York, NY, USA, 2007, pp.368-370.
DOI: 10.1145/1229285.1229330
Google Scholar
[7]
M. Chase, Multi-authority attribute based encryption, Salil P. Vadhan (Ed. ): TCC 2007, vol. 4392 of LNCS, Springer-Verlag, 2007, pp.515-534.
Google Scholar
[8]
D. Boneh, X. Boyen, and S. Halevi. Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. David Pointcheval (Ed. ): RSA-CT '06, vol. 3860 of LNCS, Springer-Verlag, 2006, pp.226-243.
DOI: 10.1007/11605805_15
Google Scholar
[9]
B. Waters, Efficient identity based encryption without random oracles, Ronald Cramer(Eds. ): Advances in Cryptology- EUROCRYPT, Springer-Verlag, 2005, vol. 3494 of LNCS, pp.114-127.
DOI: 10.1007/11426639_7
Google Scholar
[10]
P.Y. Yang et al., Fuzzy Identity Based Signature, Preprint submitted to Elsevier Preprint, 2008/002.
Google Scholar
[11]
C. Wang, J. Kim, Two Constructions of Fuzzy Identity Based Signature. International Conference on Biomedical Engineering and Informatics, 2009, pp.1-5.
DOI: 10.1109/bmei.2009.5305820
Google Scholar
[12]
C. Wang, W. Chen, Y. Liu . A Fuzzy Identity Based Signature Scheme. International Conference on E-Business and Information System Security, 2009, pp.1-5.
DOI: 10.1109/ebiss.2009.5137871
Google Scholar
[13]
L. Fan, J. Zheng and J. Yang. A BIOMETRIC IDENTITY BASED SIGNATURE SCHEME IN THE STANDARD MODEL. IEEE International Conference on Network Infrastructure and Digital Content, 2009. p.552 – 556.
DOI: 10.1109/icnidc.2009.5360996
Google Scholar
[14]
Kenneth G. Paterson and Jacob C.N. Schuldt: Efficient Identity-Based Signatures Secure in the Standard Model. Proc. L. Batten and R. Safavi-Naini Eds. : ACISP, vol. 4058 of LNCS, Springer-Verlag, 2006, pp.207-222.
Google Scholar