[1]
HAMIR A. Identity-based cryptosystems and signature schemes[ C] / /Proc of CRYPTO 1984, LNCS 196. Berlin: Springer-Verlag, 1984: 47- 53.
Google Scholar
[2]
BONEH D, FRANKLIN M. Identity-based encryption from the Weilpairing[ C] / /Proc of CRYPTO 2001, LNCS 2139. Berlin: Springer-Verlag, 2001: 213- 229.
DOI: 10.1007/3-540-44647-8_13
Google Scholar
[3]
ORWITZ J, LYNN B. Towards hierarchical identity-based encryption[C] / /Proc of EUROCRYPT 2002 , LNCS 2332. Berlin: Springer-Verlag, 2002 : 466- 481.
Google Scholar
[4]
GENTRY C, SILVERBERG A. Hierarchical ID-based cryptography[ C] / /Proc of ASIACRYPT 2002 , LNCS 2501. Berlin: Springer-Verlag, 2002: 548 - 566.
DOI: 10.1007/3-540-36178-2_34
Google Scholar
[5]
CANETTI R, HALEVI S, KATZ J. A forward-secure public-key encryptionscheme[ C] / /Proc of EUROCRYPT 2003, LNCS 2656. Berlin: Springer-Verlag, 2003: 255 -271.
DOI: 10.1007/3-540-39200-9_16
Google Scholar
[6]
CANETTI R, HALEVI S, KATZ J. Chosen-ciphertext security fromidentity-based encryption[ C] / / Proc of EUROCRYPT 2004 , LNCS3027. Berlin: Springer-Verlag, 2004: 207 - 222.
DOI: 10.1007/978-3-540-24676-3_13
Google Scholar
[7]
BONEH D, BOYEN X. Efficient Selective-ID secure identity-basedencryption without random oracles[ C] / /Proc of EUROCRYPT 2004, LNCS 3027. Berlin: Springer-Verlag, 2004: 223- 238.
DOI: 10.1007/978-3-540-24676-3_14
Google Scholar
[8]
BONEH D, BOYEN X, GOH E J. Hierarchical identity-basedencryption with constant size ciphertext [ C] / /Proc of EUROCRYPT2005, LNCS 3494. Berlin: Springer-Verlag, 2005: 440- 456.
DOI: 10.1007/11426639_26
Google Scholar
[9]
CHOW S S M, HUI L C K, YIU S M, et al. Secure hierarchicalidentity-based signature and its application[ C] / /Proc of ICICS 2004, LNCS 3269 . Berlin: Springer-Verlag, 2004: 480- 494.
Google Scholar
[10]
YUEN T H, WEI V K. Constant-size hierarchical identity-based signature/ signcryption without randomoracles[ EB/OL] . ( 2005-11-17 )[ 2008 - 03- 03] . http: / /eprint. iacr. org /2005 /412.
Google Scholar
[11]
AU M H, LIU JK, YUEN T H, et al. Efficient hierarchical identitybasedsignature in the standard model [ EB/OL] . ( 2007- 02- 21 )[ 2008 - 03- 03] . http: / /eprint. iacr. org /2007 /068.
Google Scholar
[12]
LI Jin, ZHANG Fangguo, WANG Yanming. Two Efficient Hierarchical Identity Based Signature Schemes [ J] . Acta Electronic Sinica, 2007, 35 ( 1) : 150-152.
Google Scholar