Ramanna, Somindu C.; Sarkar, Palash Anonymous constant-size ciphertext HIBE from asymmetric pairings. (English) Zbl 1317.94132 Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 344-363 (2013). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{S. C. Ramanna} and \textit{P. Sarkar}, Lect. Notes Comput. Sci. 8308, 344--363 (2013; Zbl 1317.94132) Full Text: DOI
Lin, Huang; Cao, Zhenfu; Liang, Xiaohui; Zhou, Muxin; Zhu, Haojin; Xing, Dongsheng How to construct interval encryption from binary tree encryption. (English) Zbl 1315.94085 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 19-34 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Lin} et al., Lect. Notes Comput. Sci. 6123, 19--34 (2010; Zbl 1315.94085) Full Text: DOI
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier Efficient lattice (H)IBE in the standard model. (English) Zbl 1227.94022 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 553-572 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 6110, 553--572 (2010; Zbl 1227.94022) Full Text: DOI