1. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of NDSS 2005. The Internet Society (2005).
https://doi.org/10.1145/1127345.1127346
2. Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469–491 (2008).
https://doi.org/10.1007/s00145-008-9026-x
3. Lecture Notes in Computer Science;D Boneh,2013
4. Boneh, D., Lewi, K., Montgomery, H.W., Raghunathan, A.: Key homomorphic PRFs and their applications. IACR Cryptology ePrint Archive, Report 2015/220 (2015).
http://eprint.iacr.org/2015/220
5. Boyd, C., Davies, G.T., Gjøsteen, K., Jiang, Y.: Fast and secure updatable encryption. IACR Cryptology ePrint Archive, Report 2019/1457 (2019).
https://eprint.iacr.org/2019/1457