An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing
暂无分享,去创建一个
C. Pandu Rangan | S. Sharmila Deva Selvi | Arinjita Paul | S. S. D. Selvi | Arinjita Paul | C. Rangan
[1] Robert H. Deng,et al. Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] Cheng Chen,et al. Towards a Secure Certificateless Proxy Re-Encryption Scheme , 2013, ProvSec.
[4] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[5] Zhenfeng Zhang,et al. Certificateless Proxy Re-Encryption Without Pairings , 2013, ICISC.
[6] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[7] Youngho Park,et al. Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption , 2010, Communications and Multimedia Security.
[8] C. Pandu Rangan,et al. Certificateless Proxy Re-Encryption Without Pairing: Revisited , 2015, SCC@ASIACCS.
[9] Min-Rong Chen,et al. Cryptanalysis of a Certificateless Proxy Re-encryption Scheme , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.
[10] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[11] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[12] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[13] Benoît Libert,et al. Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.
[14] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[15] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .