[1] Fiat A, Naor M. Broadcast encryption[C]//Annual International Cryptology Conference. Berlin Heidelberg:Springer, 1993:480-491.
[2] Zou X, Xiang J. Dynamic broadcast encryption scheme with revoking user[J]. Wuhan University Journal of Natural Sciences, 2013, 18(6):499-503.
[3] Ohtake G, Hanaoka G, Ogawa K. Efcient broadcast encryption with personalized messages[C]//International Conference on Provable Security. Berlin Heidelberg:Springer, 2010:214-228.
[4] Yoshimura T. Conditional access system for digital broadcasting in Japan[J]. Proceedings of the IEEE, 2006, 94(1):318-322.
[5] Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers[C]//ACM Workshop on Digital Rights Management. Berlin Heidelberg:Springer, 2002:61-80.
[6] Dodis Y, Fazio N. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack[J]. Lecture Notes in Computer Science, 2003, 2567:100-115.
[7] Goodrich M T, Sun J Z, Tamassia R. Efcient tree-based revocation in groups of low-state devices[C]//Annual International Cryptology Conference. Berlin Heidelberg:Springer, 2004:511-527.
[8] Halevy D, Shamir A. The LSD broadcast encryption scheme[J]. Lecture Notes in Computer Science, 2002, 2442:47-60.
[9] Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys[C]//Annual International Cryptology Conference. Berlin Heidelberg:Springer, 2005:258-275.
[10] Boneh D, Waters B, Zhandry M. Low overhead broadcast encryption from multilinear maps[C]//International Cryptology Conference. Berlin Heidelberg:Springer, 2014:206-223.
[11] Delerablée C. Identity-based broadcast encryption with constant size ciphertexts and private keys[C]//International Conference on the Theory and Application of Cryptology and Information Security. Berlin Heidelberg:Springer, 2007:200-215.
[12] Ren Y, Wang S, Zhang X. Non-interactive dynamic identity-based broadcast encryption without random oracles[C]//International Conference on Information and Communications Security. Berlin Heidelberg:Springer, 2012:479-487.
[13] Park S, Lee K, Lee D H. New constructions of revocable identity-based encryption from multilinear maps[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(8):1564-1577.
[14] Xu K, Liao Y, Qiao L, Liu Z, Yang X. An identity-based (IDB) broadcast encryption scheme with personalized messages (BEPM)[J]. PloS one, 2015, 10(12):e0143975. |