Publisher
Zhejiang University Press
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing
Reference25 articles.
1. Agrawal S, Boneh D, Boyen X, 2010. Efficient lattice (H)IBE in the standard model. Int Conf on the Theory and Applications of Cryptographic Techniques, p.553–572. https://doi.org/10.1007/978-3-642-13190-5_28
2. Aono Y, Boyen X, Phong LT, et al., 2013. Key-private proxy re-encryption under LWE. Int Conf on Cryptology in India, p.1–18. https://doi.org/10.1007/978-3-319-03515-4_1
3. Blaze M, Bleumer G, Strauss M, 1998. Divertible protocols and atomic proxy cryptography. Int Conf on the Theory and Applications of Cryptographic Techniques, p.127–144. https://doi.org/10.1007/BFb0054122
4. Boneh D, Freeman DM, 2011. Homomorphic signatures for polynomial functions. Annual Int Conf on the Theory and Applications of Cryptographic Techniques, p.149–168. https://doi.org/10.1007/978-3-642-20465-4_10
5. Boneh D, Gennaro R, Goldfeder S, et al., 2017. A lattice-based universal thresholdizer for cryptographic systems. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2017/251
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. TFPA: A traceable federated privacy aggregation protocol;World Wide Web;2023-07-17
2. A Secret and Traceable Approach for Cloud Data Sharing;2023 IEEE 10th International Conference on Cyber Security and Cloud Computing (CSCloud)/2023 IEEE 9th International Conference on Edge Computing and Scalable Cloud (EdgeCom);2023-07
3. Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality;IEEE Transactions on Information Forensics and Security;2023