共 26 条
- [1] Yang T., Yu B., Wang H., Et al., Cryptanalysis and improvement of Panda-public auditing for shared data in cloud and internet of things, Multimedia Tools and Applications, 76, 19, pp. 19411-19428, (2017)
- [2] Sookhak M., Gani A., Khan M.K., Et al., Dynamic remote data auditing for securing big data storage in cloud computing, Information Sciences, 380, pp. 101-116, (2017)
- [3] Waters B., Efficient identity-based encryption without random oracles, The 24th Annual International Conference on the Theory and Application of Cryptographic Techniques, pp. 114-127, (2005)
- [4] Shao J., Cao Z., Wang L., Et al., Proxy re-signature schemes without random oracles, The 8th International Conference on Cryptology, pp. 197-209, (2007)
- [5] Feng J., Lan C., Jia B., ID-based proxy re-signature scheme with strong unforgeability, Journal of Computer Applications, 34, 11, pp. 3291-3294, (2014)
- [6] Hu X., Zhang Z., Yang Y., Identity based proxy re-signature schemes without random oracle, Computational Intelligence and Security, pp. 256-259, (2009)
- [7] Shao J., Wei G., Ling Y., Et al., Unidirectional identity-based proxy re-signature, IEEE International Conference on Communications, pp. 1-5, (2011)
- [8] Huang P., Yang X., Yan L.I., Et al., Identity-based proxy re-signature scheme without bilinear pairing, Journal of Computer Applications, 35, 6, pp. 1678-1682, (2015)
- [9] Jiang M.M., Hu Y.P., Wang B.C., Et al., Identity-based unidirectional proxy re-signature over lattice, Journal of Electronics & Information Technology, 36, 3, pp. 645-649, (2014)
- [10] Tian M.M., Identity-based proxy re-signatures from lattices, Information Processing Letters, 115, 4, pp. 462-467, (2015)