Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
暂无分享,去创建一个
[1] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[2] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[3] M. Mambo,et al. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .
[4] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[5] Yevgeniy Dodis,et al. Proxy Cryptography Revisited , 2003, NDSS.
[6] Michael K. Reiter,et al. Two-party generation of DSA signatures , 2001, International Journal of Information Security.
[7] Markus Jakobsson,et al. On Quorum Controlled Asymmetric Proxy Re-encryption , 1999, Public Key Cryptography.
[8] Jun Ao,et al. Group-oriented Encryption Secure against Collude Attack , 2008, J. Convergence Inf. Technol..
[9] Kwangjo Kim,et al. Computing with secrets for mobile agent using one-time proxy signature , 2001 .
[10] Yevgeniy Dodis,et al. Proxy cryptography revisted , 2003 .
[11] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[12] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[13] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[14] Michael K. Reiter,et al. Two-party generation of DSA signatures , 2004, International Journal of Information Security.
[15] Ethan L. Miller,et al. Design for a Decentralized Security System For Network Attached Storage , 2000, IEEE Symposium on Mass Storage Systems.
[16] Matt Blaze,et al. A cryptographic file system for UNIX , 1993, CCS '93.
[17] Thomas Phan,et al. Challenge: integrating mobile wireless devices into the computational grid , 2002, MobiCom '02.
[18] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[19] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[20] Jianhua Li,et al. Broadcast Group-oriented Encryption in Group Communication , 2006, 2006 International Conference on Communications, Circuits and Systems.
[21] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..