共 50 条
- [21] Proxy Impersonation Safe Conditional Proxy Re-Encryption PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 33 - 44
- [22] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
- [23] Certificate-Based Conditional Proxy Re-Encryption NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
- [24] Securing Database Server Using Homomorphic Encryption and Re-encryption SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 277 - 289
- [26] Efficient and Secure Certificateless Proxy Re-Encryption KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
- [27] Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage IEEE ACCESS, 2017, 5 : 13336 - 13345
- [29] Improved Proxy Re-Encryption With Delegatable Verifiability IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 592 - 602
- [30] A Verifiable proxy re-encryption with keyword search without Random Oracle 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 474 - 478