Secure Non-transferable Proxy Re-encryption for Group Membership and Non-membership
暂无分享,去创建一个
[1] Siu-Ming Yiu,et al. Non-Transferable Proxy Re-Encryption Scheme , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[2] Yevgeniy Dodis,et al. Proxy cryptography revisted , 2003 .
[3] Alvaro A. Cárdenas,et al. Towards a secure and interoperable DRM architecture , 2006, DRM '06.
[4] Xavier Boyen,et al. Proxy Re-Encryption Schemes with Key Privacy from LWE , 2016, IACR Cryptol. ePrint Arch..
[5] Lifeng Guo,et al. Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security , 2012, Comput. Math. Appl..
[6] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[7] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[8] Javier López,et al. A Parametric Family of Attack Models for Proxy Re-encryption , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[9] Yevgeniy Dodis,et al. Proxy Cryptography Revisited , 2003, NDSS.
[10] Xiaoyuan Yang,et al. Identity based broadcast encryption based on one to many identity based proxy re-encryption , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[11] Eiji Okamoto,et al. New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks , 2010, Pairing.
[12] Xu An Wang,et al. How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE , 2009, 2009 First International Workshop on Database Technology and Applications.
[13] Benoît Libert,et al. Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.
[14] Xinwen Zhang,et al. CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud , 2012, ASIACCS '12.
[15] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[16] Toshihiko Matsuo,et al. Proxy Re-encryption Systems for Identity-Based Encryption , 2007, Pairing.
[17] Jun Ao,et al. Group-Based Proxy Re-encryption Scheme , 2009, ICIC.
[18] Jing Xu,et al. Non-Transferable Proxy Re-Encryption , 2018, IACR Cryptol. ePrint Arch..
[19] Feng-Hao Liu,et al. Various Proxy Re-Encryption Schemes from Lattices , 2016, IACR Cryptol. ePrint Arch..