共 50 条
- [21] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 541 - 551
- [22] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing Cluster Computing, 2019, 22 : 541 - 551
- [24] Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing 2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 264 - 269
- [25] A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing NETWORK AND SYSTEM SECURITY, 2014, 8792 : 82 - 95
- [27] POSTER: A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 869 - 871
- [28] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
- [29] Assured Update Scheme of Authorization for Cloud Data Access Based on Proxy Re-encryption Su, Mang (sumang@njust.edu.cn), 1600, Chinese Academy of Sciences (31): : 1563 - 1572
- [30] Proxy re-encryption based multi-factor access control scheme in cloud Tongxin Xuebao/Journal on Communications, 2018, 39 (02): : 93 - 101