Certificate-Based Conditional Proxy Re-Encryption
暂无分享,去创建一个
[1] Robert H. Deng,et al. Conditional proxy re-encryption secure against chosen-ciphertext attack , 2009, ASIACCS '09.
[2] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption , 2008, Public Key Cryptography.
[3] Xinyi Huang,et al. Certificate-based signcryption with enhanced security features , 2012, Comput. Math. Appl..
[4] Vincent Rijmen,et al. Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings , 2008, INDOCRYPT.
[5] Susan Hohenberger,et al. Key-Private Proxy Re-encryption , 2009, CT-RSA.
[6] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[7] Sang-Uk Shin,et al. Certificate-Based Proxy Re-encryption for Public Cloud Storage , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[8] Stanislaw Jarecki,et al. Public Key Cryptography – PKC 2009 , 2009, Lecture Notes in Computer Science.
[9] Marc Fischlin,et al. Topics in Cryptology – CT-RSA 2009 , 2009 .
[10] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[11] Qiang Tang,et al. Type-Based Proxy Re-encryption and Its Construction , 2008, INDOCRYPT.
[12] Yang Lu,et al. Forward-Secure Certificate-Based Encryption , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[13] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[14] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[15] Yi Mu,et al. Constructions of certificate-based signature secure against key replacement attacks , 2010, J. Comput. Secur..
[16] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[17] Wen-Guey Tzeng,et al. Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.
[18] Yi Mu,et al. Certificate-Based Signature: Security Model and Efficient Construction , 2007, EuroPKI.
[19] Yang Lu,et al. Forward-Secure Certificate-Based Encryption and its Generic Construction , 2010, J. Networks.
[20] Zhiwei Wang,et al. Provably secure certificate-based signature scheme without pairings , 2013, Inf. Sci..
[21] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[22] Natarajan Meghanathan,et al. Advances in Network Security and Applications , 2011 .
[23] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[24] Ronald Cramer,et al. Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings , 2008, Public Key Cryptography.
[25] Willy Susilo,et al. Anonymous Conditional Proxy Re-encryption without Random Oracle , 2009, ProvSec.
[26] C. Pandu Rangan,et al. Conditional Proxy Re-Encryption - A More Efficient Construction , 2011 .
[27] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[28] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[29] Zhenfu Cao,et al. CCA-Secure Proxy Re-Encryption without Pairings , 2009, IACR Cryptol. ePrint Arch..
[30] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[31] Lizhong Xu,et al. An efficient short certificate-based signature scheme , 2012, J. Syst. Softw..
[32] Yuan Zhou,et al. Achieving key privacy without losing CCA security in proxy re-encryption , 2012, J. Syst. Softw..