A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme
暂无分享,去创建一个
Sangjin Kim | Junggab Son | Heekuck Oh | Junggab Son | H. Oh | Sangjin Kim
[1] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[2] Khaled M. Khan,et al. Establishing Trust in Cloud Computing , 2010, IT Professional.
[3] 박광용,et al. Proxy Re-encryption 기술 , 2009 .
[4] M. Mambo,et al. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .
[5] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[6] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[7] Robert H. Deng,et al. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security , 2009, ISC.
[8] Kefei Chen,et al. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings , 2008, CANS.
[9] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[10] Robert H. Deng,et al. Conditional Proxy Broadcast Re-Encryption , 2009, ACISP.
[11] Jing Zhao,et al. Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[12] Lori M. Kaufman. Data Security in the World of Cloud Computing , 2009, IEEE Security and Privacy.
[13] David Cash,et al. The Twin Diffie–Hellman Problem and Applications , 2009, Journal of Cryptology.
[14] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.