1. Attribute-based encryption for fine-grained access control of encrypted data;Goyal,2006
2. Fuzzy identity-based encryption;Sahai,2005
3. Proxy cryptosystems: delegation of the power to decrypt ciphertexts;Mambo;IEICE Trans.,1997
4. Divertible protocols and atomic proxy cryptography;Blaze,1998
5. Improved proxy re-encryption schemes with applications to secure distributed storage;Ateniese;ACM Trans. Inf. Syst. Secur.,2006