Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference30 articles.
1. Divertible protocols and atomic proxy cryptography;Blaze,1998
2. Chosen-ciphertext secure proxy re-encryption;Canetti,2007
3. Identity-based proxy re-encryption;Green,2007
4. Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts;Liang;Theor. Comput. Sci.,2014
5. Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation;Lai;Theor. Comput. Sci.,2020
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献