共 50 条
- [3] Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 679 - 685
- [4] RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019, 2019, 11319 : 349 - 363
- [5] Group-Based Proxy Re-encryption Scheme [J]. EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1025 - 1034
- [7] A quantum secure ID-based cryptographic encryption based on group rings [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2022, 47 (01):
- [8] Proxy Re-Encryption Based on Homomorphic Encryption [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
- [9] ID-based secure group communication in grid computing [J]. CURRENT TRENDS IN HIGH PERFORMANCE COMPUTING AND ITS APPLICATIONS, PROCEEDINGS, 2005, : 245 - 250
- [10] A proxy re-encryption scheme based on elliptic curve group [J]. Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):