[1]
B. Chor, A. Fiat, and M. Naor, in: Advances in Cryptology - CRYPTO '93 (Santa Barbara, California, USA, August 22-26, 1993), LNCS Vol. 839, Springer (1994), p.257.
DOI: 10.1007/3-540-48658-5_25
Google Scholar
[2]
A. Kiayias and M. Yung, in: Advances in Cryptology - EUROCRYPT 2002 (Amsterdam, The Netherlands, April 28 - May 2, 2002), LNCS Vol. 2332, Springer (2002), p.450.
Google Scholar
[3]
H. Chabanne, D. H. Phan, and D. Pointcheval, in: Advances in Cryptology - EUROCRYPT 2005(Aarhus, Denmark, May 22-26, 2005), LNCS Vol. 3494, Springer (2005), p.542.
DOI: 10.1007/11426639_32
Google Scholar
[4]
M. Abdalla, A. W. Dent, J. Malone-Lee, G. Neven, D. Phan, and N. P. Smart, in: Public Key Cryptography - PKC 2007 (Beijing, China, April 16-20, 2007), LNCS Vol. 4450, Springer (2007), p.361.
DOI: 10.1007/978-3-540-71677-8_24
Google Scholar
[5]
D. Boneh and M. Naor, in: Proceedings of the 2008 ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, October 27-31, 2008), ACM (2008), p.501.
Google Scholar
[6]
O. Billet and D. H. Phan, in: Information Theoretic Security (Calgary, Canada, August 10-13, 2008), LNCS Vol. 5155, Springer (2008), p.171.
DOI: 10.1007/978-3-540-85093-9_17
Google Scholar
[7]
Y. -R. Chen and W. -G. Tzeng, in: Information and Communications Security (Beijing, China, December 14-17, 2009), LNCS Vol. 5927, Springer (2009), p.121.
Google Scholar
[8]
X. Zhao and F. Zhang, in: Information Security Practice and Experience (Guangzhou, China, May 30 - June 1, 2011), LNCS Vol. 6672, Springer (2011), p.302.
Google Scholar
[9]
X. Zhao and H. Li, in: Provable Security (Chengdu, China, September 26-28, 2012), LNCS Vol. 7496, Springer (2012), p.318.
Google Scholar
[10]
J. H. Park, H. J. Kim, M. H. Sung, and D. H. Lee, Broadcasting, IEEE Transactions on, Vol. 54, no. 3, IEEE (2008), p.401.
Google Scholar
[11]
O. Billet and D. H. Phan, in: Advances in Cryptology - EUROCRYPT 2009 (Cologne, Germany, April 26-30, 2009), LNCS Vol. 5479, Springer (2009), p.189.
Google Scholar
[12]
D. Boneh and M. Hamburg, in: Advances in Cryptology - ASIACRYPT 2008 (Melbourne, Australia, December 7-11, 2008), LNCS Vol. 5350, Springer (2008), p.455.
Google Scholar
[13]
C. Gentry, in: Advances in Cryptology - EUROCRYPT 2006 (St. Petersburg, Russia, May 28 - June 1, 2006), LNCS Vol. 4004, Springer (2006), p.445.
Google Scholar
[14]
D. Boneh and M. Franklin, in: Advances in Cryptology - CRYPTO 2001 (Santa Barbara, California, USA, August 19-23, 2001), LNCS Vol. 2139, Springer. (2001), p.213.
DOI: 10.1007/3-540-44647-8
Google Scholar
[15]
D. Boneh, X. Boyen, and E. -J. Goh, in: Advances in Cryptology - EUROCRYPT 2005 (Aarhus, Denmark, May 22-26, 2005), LNCS Vol. 3494, Springer (2005), p.440.
DOI: 10.1007/11426639_26
Google Scholar
[16]
X. Zhao, G. Zhao and H. Li, Information on http: /web. xidian. edu. cn/xwzhao/en/papers. html.
Google Scholar
[17]
N. Attrapadung, B. Libert, and E. de Panafieu, in: Public Key Cryptography - PKC 2011 (Taormina, Italy, March 6-9, 2011), LNCS Vol. 6571, Springer (2011), p.90.
Google Scholar
[18]
R. Canetti, S. Halevi, and J. Katz, in: Advances in Cryptology - EUROCRYPT 2004 (Interlaken, Switzerland, May 2-6, 2004), LNCS Vol. 3027, Springer (2004), p.207.
DOI: 10.1007/978-3-540-24676-3_13
Google Scholar
[19]
D. Boneh and J. Katz, in: Topics in Cryptology - CT-RSA 2005 (San Francisco, CA, USA, February 14-18, 2005), LNCS Vol. 3376, Springer (2005), p.87.
DOI: 10.1007/b105222
Google Scholar