1. Understanding PKI: Concepts, Standards, and Deployment Considerations;Adams,2002
2. Improved proxy re-encrypiton schemes with applications to secure distributed storage;Ateniese;ACM Trans. Inf. Syst. Secur.,2006
3. Ciphertext-policy attribute-based encryption;Bethencourt,2007
4. Divertible protocols and atomic proxy cryptography;Blaze,1998
5. Efficient selective-id secure identity-based encryption without random oracles;Boneh,2004