共 6 条
- [1] CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles[J]. DENG Robert. Science China(Information Sciences). 2010(03)
- [3] Cumulus[J] . Michael Vrable,Stefan Savage,Geoffrey M. Voelker. ACM Transactions on Storage (TOS) . 2009 (4)
- [4] Improved proxy re-encryption schemes with applications to secure distributed storage[J] . Giuseppe Ateniese,Kevin Fu,Matthew Green,Susan Hohenberger. ACM Transactions on Information and System Security (TISSEC) . 2006 (1)
- [6] Final report on main computational assumptions in cryptography .2 http://www.ecrypt.eu.org/documents/D.MAYA.6.pdf . 2013