Author:
Liu Zhen,Pan Yanbin,Zheng Jinwei
Publisher
Springer Science and Business Media LLC
Reference25 articles.
1. Blaze M, Bleumer G, and Strauss M, Divertible protocols and atomic proxy cryptography, International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Espoo, 1998, 127–144.
2. Canetti R and Hohenberger S, Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM, 2007, 185–194.
3. Shor P W, Algorithms for quantum computation: Discrete logarithms and factoring, Proceedings of the 35th Annual Symposium on Foundations of Computer Science, IEEE, Santa Fe, 1994, 124–134.
4. Shor P W, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Review 41, 303–332. SIAM J. Comput., 1997, 26(5): 1484–1509.
5. NIST: Post-Quantum Cryptography Standardization, https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization.