1. Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Trans. Fund. Electronics Communications and Computer Science E80-A/1, 54–63 (1997)
2. Lecture Notes in Computer Science;M. Blaze,1998
3. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In: The 12th Annual Network and Distributed System Security Symposium, pp. 29–43 (2005), Full version available at
http://eprint.iacr.org/2005/028
4. Lecture Notes in Computer Science;M. Jakobsson,1999
5. Dodis, Y., Ivan, A.: Proxy cryptography revisited. In: Proceedings of the Tenth Network and Distributed System Security Symposium (February 2003)