Multi-use and unidirectional identity-based proxy re-encryption schemes
暂无分享,去创建一个
[1] Alvaro A. Cárdenas,et al. Towards a secure and interoperable DRM architecture , 2006, DRM '06.
[2] Kefei Chen,et al. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings , 2008, CANS.
[3] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[4] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[5] Zhenfu Cao,et al. A secure identity-based proxy multi-signature scheme , 2009, Inf. Sci..
[6] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[7] Zhenfu Cao,et al. CCA-Secure Proxy Re-Encryption without Pairings , 2009, IACR Cryptol. ePrint Arch..
[8] Markus Jakobsson,et al. On Quorum Controlled Asymmetric Proxy Re-encryption , 1999, Public Key Cryptography.
[9] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[10] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[11] Moni Naor,et al. Non-Malleable Cryptography (Extended Abstract) , 1991, STOC 1991.
[12] Jacques Stern,et al. RSA-OAEP Is Secure under the RSA Assumption , 2001, Journal of Cryptology.
[13] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[14] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[15] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[16] Yuan Zhou,et al. How to construct secure proxy cryptosystem , 2007, Inf. Sci..
[17] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[18] Moni Naor,et al. Nonmalleable Cryptography , 2000, SIAM Rev..
[19] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[20] M. Mambo,et al. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .
[21] Susan Hohenberger,et al. Key-Private Proxy Re-encryption , 2009, CT-RSA.
[22] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[23] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[24] Dan Boneh,et al. Simplified OAEP for the RSA and Rabin Functions , 2001, CRYPTO.
[25] Frederik Vercauteren,et al. A comparison of MNT curves and supersingular curves , 2006, Applicable Algebra in Engineering, Communication and Computing.
[26] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[27] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[28] Kuo-Yu Tsai,et al. Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification , 2007, Inf. Sci..
[29] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[30] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[31] Xiaohui Liang,et al. Proxy re-encryption with keyword search , 2010, Inf. Sci..
[32] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.
[33] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[34] Victor Shoup,et al. OAEP Reconsidered , 2001, CRYPTO.