共 50 条
- [31] Secure Multicast Using Proxy Re-encryption in IoT Environment ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 66 - 70
- [33] CCA-Secure Proxy Re-encryption without Pairings PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 357 - 376
- [34] Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
- [35] Elliptic Curve Qu-Vanstone Based Signcryption Schemes with Proxy Re-encryption for Secure Cloud Data Storage CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 1 - 18
- [36] Combined Proxy Re-encryption INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 49 - 66
- [38] A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage IEEE ACCESS, 2018, 6 : 70017 - 70024
- [39] Improved Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 476 - +
- [40] Restricted CCA-secure Bidirectional Proxy Re-encryption Scheme PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 678 - 681