LIBERT B, VERGNAUD D. Adaptive-ID secure revocable identity-based encryption[C]//Topics in Cryptology-CT-RSA2009. Berlin: Springer, 2009: 1-15.
[2]
SEO J H, EMURA K. Efficient delegation of keygeneration and revocation functionalities in identity-based encryption[C]//Topics in Cryptology-CTRSA 2013. Berlin: Springer, 2013: 343-358.
[3]
SEO J H, EMURA K. Revocable identity-based encryption revisited: security model and construction[C]//Public-Key Cryptography-PKG2013. Berlin:Springer, 2013: 216-234.
[4]
ZHENG Y L. Digital signcryption or how to achieve cost(signature and encryption) << cost(signature) + cost(encryption)[C]//Advances inCryptology―CRYPTO’97. Berlin: Springer, 1997: 165-179.
[5]
GOYAL V. Certificate revocation using fine grained certificate space partitioning[C]//Financia Cryptography and Data Security.Berlin: Springer, 2007: 247-259.
[6]
BONEH D, FRANKLIN M. Identity-based encryption from the weil pairing[C]//Advances in Cryptology-CRYPTO 2001. Berlin: Springer, 2001: 213-229.
[7]
BOLDREVA A, GOYAL V, KUMER V. Identity-based encryption with efficient revocation [C]//Proceedings of the 15th ACM Conference on Computer and Communications Security. Berlin: Springer, 2008: 417-426.
[8]
锁琰, 李晓辉, 徐小岩, 等. 一种安全的分布式群签名方案[J]. 哈尔滨工程大学学报, 2011, 32(12): 1594-1623.SUO Yan, LI Xiaohui, XU Xiaoyan, et al. A secure distributed group signature scheme[J]. Journal of Harbin Engineering University, 2011, 32(12): 1594-1623.
[9]
TSAI T T, TSENG Y M, WU T Y. Provably secure revocable ID-based signature in the standard model[J].Security and Communication Networks, 2013, 6(6): 669-796.
[10]
WU T Y, TSAI T T, TSENG Y M. A revocable ID-based signcryption scheme[J].Information Hiding and Multi-media Signal Processing, 2012, 3(3): 240-251.
[11]
SELVI S S D, VIVEK S S, VINAYAGAMURTHY D, et al. ID based signcryption scheme in standard model[C]//Provable Security. Berlin: Springer, 2012: 35-52.