[1]
A. Shamir, Identity-based cryptosystems and signature schemes", in Advances in Cryptology-Crypto , 84, Lecture Notes in Computer Science, Vol. 196, Springer-Verlag, pp.47-53, (1984).
DOI: 10.1007/3-540-39568-7_5
Google Scholar
[2]
Dan Boneh, Matthew Franklin, Identity-Based Encryption from the Weil Pairing, in SIAM J. of Computing, Vol. 32, No. 3, pp.586-615, (2003).
DOI: 10.1137/s0097539701398521
Google Scholar
[3]
C. Gentry and S. Halevi, Hierarchical identity based encryption with polynomially many levels, Lecture Notes in Computer Science, vol. 5444, pp.437-456, (2009).
DOI: 10.1007/978-3-642-00457-5_26
Google Scholar
[4]
D. Boneh and X. Boyen, Efficient selective-ID secure identity based encryption without random oracles, , Lecture Notes in Computer Science vol. 3027, pp.223-238, (2004).
DOI: 10.1007/978-3-540-24676-3_14
Google Scholar
[5]
D. Boneh, X. Boyen, and E. J. Goh, Hierarchical identity based encryption with constant size ciphertext, , Lecture Notes in Computer Science, vol. 3494, pp.440-456, (2005).
DOI: 10.1007/11426639_26
Google Scholar
[6]
D. Boneh and X. Boyen, Efficient selective identity-based encryption without random oracles, , Journal of Cryptology, vol. 24, no. 4, pp.659-693, October, (2011).
DOI: 10.1007/s00145-010-9078-6
Google Scholar
[7]
C. Schridde, M. Smith, and B. Freisleben, An identity-based key agreement protocol for the network layer, Lecture Notes in Computer Science, vol. 5229, pp.409-422, (2008).
DOI: 10.1007/978-3-540-85855-3_27
Google Scholar
[8]
C. Schridde, T. Dörnemann, E. Juhnke, B. Freisleben, and M. Smith, An identity-based security infrastructure for cloud environments, in Proc. of IEEE International Conf. on Wireless Communications, Networking and Information Security, pp.644-649, (2010).
DOI: 10.1109/wcins.2010.5541859
Google Scholar
[9]
H. W. Li, Y. S. Dai, T. Ling, and H. M. Yang, Identity-based authentication for cloud computing, Lecture Notes in Computer Science, vol. 5931, pp.157-166, (2009).
DOI: 10.1007/978-3-642-10665-1_14
Google Scholar
[10]
Lishan Kang, Xuejie Zhang, Identity-Based Authentication in Cloud Storage Sharing, in International Conference on Multimedia Information Networking and Security, (2010).
DOI: 10.1109/mines.2010.180
Google Scholar
[11]
Chenlei Cao, Ru Zhang, Mengyi Zhang and Yixian Yang, IBC-Based Entity Authentication Protocols for Federated Cloud Systems, in ksii transactions on internet and information systems vol. 7, No. 5, May, (2013).
DOI: 10.3837/tiis.2013.05.020
Google Scholar
[12]
Mao, W. B, An Identity-based Non-interactive Authentication Framework for Computational Grids, May, 29, (2004).
Google Scholar
[13]
Ran Canetti and Hugo Krawczyk, Analysis of key-exchange protocols and their use for building secure channels, , Advances in Cryptology –Eurocrypt 2001, volume 2045 of LNCS. Spring-Verlag, (2001).
DOI: 10.1007/3-540-44987-6_28
Google Scholar