New Construction of PVPKE Scheme Based on Signed Quadratic Residues
暂无分享,去创建一个
[1] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[2] Xu An Wang,et al. On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[3] Juan Manuel González Nieto,et al. Publicly verifiable ciphertexts , 2013, J. Comput. Secur..
[4] Xu An Wang,et al. CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications , 2013, J. Comput..
[5] Xu An Wang,et al. Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[6] Ran Canetti,et al. An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack , 1999, EUROCRYPT.
[7] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..
[8] Eike Kiltz,et al. The Group of Signed Quadratic Residues and Applications , 2009, CRYPTO.
[9] Jin Li,et al. Efficient Fair Conditional Payments for Outsourcing Computations , 2012, IEEE Transactions on Information Forensics and Security.