1. Improved proxy re-encryption schemes with applications to secure distributed storage;Ateniese;ACM Trans. Inf. Syst. Secur.,2006
2. Dynamic Secure Cloud Storage with Provenance, Cryptography and Security: From Theory to Applications;Chow,2012
3. A group file encryption method using dynamic system environment key;Tsai,2014
4. Fuzzy identity-based encryption;Sahai,2005
5. Ciphertext-policy attribute-based encryption;Bethencourt,2007