暂无分享,去创建一个
[1] Steven Myers,et al. Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation , 2017, IACR Cryptol. ePrint Arch..
[2] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[3] Shawn Wilkinson,et al. Storj A Peer-to-Peer Cloud Storage Network , 2014 .
[4] Núñez Montañez,et al. New Security Definitions, Constructions and Applications of Proxy Re-Encryption , 2015 .
[5] Jason Teutsch,et al. A scalable verification solution for blockchains , 2019, ArXiv.
[6] Xavier Boyen,et al. Proxy Re-Encryption Schemes with Key Privacy from LWE , 2016, IACR Cryptol. ePrint Arch..
[7] Juan Benet,et al. IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.
[8] Iddo Bentov,et al. How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.
[9] Xiaodong Lin,et al. Proxy Re-encryption with Delegatable Verifiability , 2016, ACISP.
[10] Michael T. Goodrich,et al. Accountable Storage , 2014, ACNS.
[11] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[12] Sotiris Ioannidis,et al. PixelVault: Using GPUs for Securing Cryptographic Operations , 2014, CCS.
[13] Javier López,et al. NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU , 2015, AsiaCCS.
[14] Matthew Green,et al. Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control , 2017, IACR Cryptol. ePrint Arch..
[15] Benoît Libert,et al. Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.
[16] Javier López,et al. Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation , 2017, J. Netw. Comput. Appl..
[17] Liang Gu,et al. Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing , 2010, INTRUST.
[18] Susan Hohenberger,et al. Key-Private Proxy Re-encryption , 2009, CT-RSA.
[19] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[20] Alex Pentland,et al. Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.
[21] Evan Duffield,et al. Dash: A Privacy-Centric Crypto-Currency , 2017 .