1. A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain;Agyekum;IEEE Syst. J.,2022
2. Chosen-ciphertext security from identity-based encryption;Boneh;SIAM J. Comput.,2007
3. Public key encryption with keyword search;Boneh,2004
4. Pairing free and implicit certificate based signcryption scheme with proxy re-encryption for secure cloud data storage;Braeken,2017
5. Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security;Canto,2023