FileReCrypt: An Authenticated And Revocable Scheme For Personal File Sharing Using Cloud Storage
暂无分享,去创建一个
[1] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[2] Steven Myers,et al. Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation , 2017, IACR Cryptol. ePrint Arch..
[3] K. Sakurai,et al. Realizing Proxy Re-encryption in the Symmetric World , 2011 .
[4] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[5] Douglas R. Stinson,et al. Something About All or Nothing (Transforms) , 2001, Des. Codes Cryptogr..
[6] V. Canda,et al. A new mode of using all-or-nothing transforms , 2002, Proceedings IEEE International Symposium on Information Theory,.
[7] Burton S. Kaliski,et al. PKCS #7: Cryptographic Message Syntax Version 1.5 , 1998, RFC.
[8] Angelos D. Keromytis,et al. Conversion and proxy functions for symmetric key ciphers , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[9] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[10] Yevgeniy Dodis,et al. Proxy Cryptography Revisited , 2003, NDSS.
[11] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[12] M. Mambo,et al. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .
[13] Markus Jakobsson,et al. On Quorum Controlled Asymmetric Proxy Re-encryption , 1999, Public Key Cryptography.
[14] Anand Desai,et al. The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search , 2000, CRYPTO.