Proxy Re-encryption Scheme from IBE to CBE
暂无分享,去创建一个
[1] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[2] AtenieseGiuseppe,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006 .
[3] Zhenfu Cao,et al. Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security , 2008, IACR Cryptol. ePrint Arch..
[4] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[5] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[6] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[7] Wen-Guey Tzeng,et al. Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.
[8] Yevgeniy Dodis,et al. Proxy Cryptography Revisited , 2003, NDSS.
[9] Benoît Libert,et al. Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.
[10] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[11] Luther Martin,et al. Introduction to Identity-Based Encryption , 2008 .
[12] Fred B. Schneider,et al. Distributed Blinding for ElGamal Re-encryption , 2004 .
[13] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[14] Yevgeniy Dodis,et al. Proxy cryptography revisted , 2003 .
[15] Abhi Shelat,et al. Securely Obfuscating Re-Encryption , 2007, Journal of Cryptology.
[16] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[17] Susan Hohenberger,et al. Advances in signatures, encryption, and E-Cash from bilinear groups , 2006 .
[18] Toshihiko Matsuo,et al. Proxy Re-encryption Systems for Identity-Based Encryption , 2007, Pairing.
[19] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[20] Dan Boneh,et al. Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.
[21] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.
[22] Vipul Goyal,et al. Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.