Author:
Ge Chunpeng,Susilo Willy,Wang Jiandong,Fang Liming
Funder
National Natural Science Foundation of China
National Natural Science Foundation of Jiangsu
National Science Foundation for Post-doctoral Scientists of China
National Science Foundation for Post-doctoral Scientists of Jiangsu
China Postdoctoral Science Special Foundation
Research Foundation for Humanities and Social Sciences of Ministry of Education, China
Qing Lan Project for Young Researchers of Jiangsu Province of China
Subject
Law,Hardware and Architecture,Software
Reference37 articles.
1. M. Green, G. Ateniese, Identity-based proxy re-encryption. Proceedings of ACNS 2007, Zhuhai, China, Springer-Verlag, Berlin 5–8 June, 2007, pp. 288–306.
2. J. Shao, G. Wei, Y. Ling, M. Xie, Identity-based Conditional Proxy Re-encryption. Proceedings of IEEE ICC 2011, Kyoto, Japan, IEEE, USA 5-9 June, 2011, pp. 1–5.
3. K. Liang, Z. Liu, X. Tan, D.S. Wong, C. Tang, A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. Proceedings of ICISC 2012, Seoul, Korea, Springer-Verlag, Berlin 28-30 November, 2013, pp. 231–246.
4. j. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encrtption. Proceedings of IEEE Symposium on Security and Privacy 2007, Berkeley, California, IEEE Computer Society, Washington, DC, USA 20–23 May, 2007, pp. 321–334.
5. X. Liang, Z. Cao, H. Lin, J. Shao, Attribute-Based Proxy Re-Encryption with Delegating Capabilities. Proceedings of ASIACCS 2009, Sydney, Australia, ACM, NewYork 10–12 March, 2009, pp. 276–286.
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献