Author:
Mao Xianping,Li Xuefeng,Wu Xiaochuan,Wang Chuansheng,Lai Junzuo
Publisher
Springer International Publishing
Reference32 articles.
1. Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Topics in Cryptology - CT-RSA 2009 The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, 20–24 April 2009. Proceedings, pp. 279–294 (2009)
2. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
3. Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology (1996)
4. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
5. Lecture Notes in Computer Science;M Blaze,1998
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献