共 50 条
[41]
Blockchain Data Controlled Sharing Scheme Based on Proxy Re-Encryption
[J].
Tien Tzu Hsueh Pao/Acta Electronica Sinica,
2023, 51 (02)
:477-488
[44]
Proxy Impersonation Safe Conditional Proxy Re-Encryption
[J].
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013),
2013,
:33-44
[45]
TIDE: A Novel Approach to Constructing Timed-Release Encryption
[J].
INFORMATION SECURITY AND PRIVACY, ACISP 2022,
2022, 13494
:244-264
[46]
Hierarchical Identity Role based proxy re-encryption scheme for cloud computing
[J].
PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS),
2013,
[47]
Anonymous Query Mechanism Construction of Timed-Release Encryption
[J].
Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences,
2022, 54 (03)
:64-71
[50]
Proxy Visible Re-Encryption Scheme with Application to E-Mail Forwarding
[J].
SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS,
2017,
:212-217