Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. M. Bellare, P. Rogaway, “Random Oracles are Practical: a paradigm for designing eficient protocols,” 1st ACM Conference on Computer and Communications Security, pp. 62–73, 1993.
2. M. Blaze, G. Bleumer, M. Strauss, “Divertible Protocols and Atomic Proxy Cryptography,” Eurocrypt’ 98, pp. 127–144
3. D. Chaum, H. VanAntwerpen, “Undeniable Signatures,” Crypto’ 89, pp. 212–216
4. D. Chaum, “Zero-Knowledge Undeniable Signatures,” Eurocrypt’ 90, pp. 458–464
5. A. DeSantis, Y. Desmedt, Y. Frankel, and M. Yung, “How to Share a Function Securely,” STOC’ 94, pp. 522–533
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Multilevel Electronic Control Unit Re-Encryption Scheme for Autonomous Vehicles;IEEE Transactions on Intelligent Transportation Systems;2024-01
2. CBP: Coalitional-Game-Based Broadcast Proxy Re-Encryption in IoT;IEEE Internet of Things Journal;2023-09-01
3. Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud;The Journal of Supercomputing;2023-04-03
4. BSA: Enabling Biometric-Based Storage and Authorization on Blockchain;2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2021-10
5. Universal Proxy Re-Encryption;Public-Key Cryptography – PKC 2021;2021