Publisher
Springer Nature Switzerland
Reference30 articles.
1. Liu, J.K., Chu, C.K., Zhou, J.: Identity-based server-aided decryption. In: Parampalli, U., Hawkes, P. (eds.) Information Security and Privacy. 16th Australasian Conference, ACISP 2011, Melbourne, Australia, 11–13 July 2011, Proceedings 16, vol. 6812, pp. 337–352. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22497-3_22
2. Li, K., Wang, J., Zhang, Y., Ma, H.: Key policy attribute-based proxy re-encryption and RCCA secure scheme. J. Internet Serv. Inf. Secure. 4(2), 70–82 (2014)
3. Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384–1393 (2015)
4. Liu, J., Li, W., Karame, G.O., Asokan, N.: Toward fairness of cryptocurrency payments. IEEE Secur. Priv. 16(3), 81–89 (2018)
5. Zhang, Y., Deng, R.H., Liu, X., Zheng, D.: Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462, 262–277 (2018)