@inproceedings{e31488105ed041cebaf921d1f63b1076,
title = "How to construct interval encryption from binary tree encryption",
keywords = "Binary tree encryption, Hierarchical IBE, Interval encryption, Public key broadcast encryption",
author = "Huang Lin and Zhenfu Cao and Xiaohui Liang and Muxin Zhou and Haojin Zhu and Dongsheng Xing",
year = "2010",
doi = "10.1007/978-3-642-13708-2\_2",
language = "English",
isbn = "3642137075",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "19--34",
booktitle = "Applied Cryptography and Network Security - 8th International Conference, ACNS 2010, Proceedings",
note = "8th International Conference on Applied Cryptography and Network Security, ACNS 2010 ; Conference date: 22-06-2010 Through 25-06-2010",
}