Subject
Law,Hardware and Architecture,Software,General Computer Science,Computer Science Applications
Reference41 articles.
1. Improved proxy re-encryption schemes with applications to secure distributed storage;Ateniese;ACM Trans. Inf. Syst. Secur.,2006
2. Proxy cryptosystems: Delegation of power to decrypt ciphertexts;Mambo;IEICE Trans. Fundam. Electron. Commun. Sci.,1997
3. Divertible protocols and atomic proxy cryptography;Blaze,1998
4. Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE;Liang,2021
5. Attribute-based proxy re-signature from standard lattices and its applications;Luo;Comput. Stand. Interfaces,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献