1. Cao Z F. New Directions of Modern Cryptography. Boca Raton: CRC Press Inc., 2012. 1–400
2. Shao J, Cao Z F, Wang L C, et al. Proxy re-signature schemes without random oracles. In: Proceedings of 8th International Conference on Cryptology in India, Chennai, 2007. 197–209
3. Shao J, Cao Z F. CCA-secure proxy re-encryption without pairings. In: Proceedings of 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, 2009. 357–376
4. Liu Z, Cao Z F, Huang Q, et al. Fully secure multiauthority ciphertext-policy attribute-based encryption without random oracles. In: Proceedings of 16th European Symposium on Research in Computer Security, Leuven, 2011. 278–297
5. Liang X H, Cao Z F, Lin H, et al. Provably secure and efficient bounded ciphertext policy attribute based encryption. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, 2009. 343–352