共 50 条
- [31] CCA secure and efficient proxy re-encryption scheme without bilinear pairing [J]. Journal of Information Security and Applications, 2021, 58
- [32] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption [J]. Computer Journal, 2014, 58 (10): : 2778 - 2792
- [33] CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
- [34] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption [J]. COMPUTER JOURNAL, 2015, 58 (10): : 2778 - 2792
- [36] Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program [J]. IEEE ACCESS, 2017, 5 : 16214 - 16228
- [37] CCA2 secure biometric identity based encryption with constant-size ciphertext [J]. Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827
- [40] A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system [J]. Designs, Codes and Cryptography, 2018, 86 : 2587 - 2603