共 17 条
[1]
Ateniese G., Fu K., Green M., Hohenberger S., Improved proxy re-encryption schemes with applications to secure distributed storage, NDSS., (2005)
[2]
Blaze M., Bleumer G., Strauss M., Divertible protocols and atomic proxy cryptography, EUROCRYPT 1998. LNCS, 1403, pp. 127-144, (1998)
[3]
Boneh D., Franklin M., Identity-based encryption from the weil pairing, CRYPTO 2001. LNCS, 2139, pp. 213-229, (2001)
[4]
Boneh D., Franklin M., Identity-based encryption from the weil pairing, SIAM Journal of Computing, 32, 3, pp. 586-615, (2003)
[5]
Canetti R., Hohenberger S., Chosen-ciphertext secure proxy re-encryption, ACM Conference on Computer and Communications Security, pp. 185-194, (2007)
[6]
ElGamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 31, 4, pp. 469-472, (1985)
[7]
Huang C.-Y., Chiu Y.-P., Chen K.-T., Lei C.-L., Secure multicast in dynamic environments, Computer Networks (Amsterdam, Netherlands: 1999), 51, 10, pp. 2805-2817, (2007)
[8]
Hur J., Improving Security and Efficiency in Attribute-Based Data Sharing, IEEE Transactions on Knowledge and Data Engineering, (2012)
[9]
Kapadia A., Tsang P.P., Smith S.W., Attribute-based publishing with hidden credentials and hidden policies, NDSS., (2007)
[10]
Lin H.-Y., Tzeng W.-G., A secure erasure code-based cloud storage system with secure data forwarding, IEEE Trans. Parallel Distrib. Syst., 23, 6, pp. 995-1003, (2012)