共 50 条
- [3] A proxy re-encryption scheme based on elliptic curve group [J]. Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):
- [4] Proxy Re-encryption Scheme Based on SK Identity Based Encryption [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
- [6] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
- [7] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575
- [8] A new RSA-based proxy re-encryption scheme [J]. Journal of Computational Information Systems, 2015, 11 (02): : 567 - 575
- [9] Identity Based Proxy Re-encryption Scheme under LWE [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6116 - 6132
- [10] Proxy Re-Encryption Based on Homomorphic Encryption [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161