共 50 条
- [21] Fully Secure Identity Based Proxy Re-Encryption Schemes in the Standard Model PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 53 - +
- [24] Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (06):
- [25] Secure Certificateless Proxy Re-encryption Without Pairing ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 85 - 101
- [26] Towards a Secure Certificateless Proxy Re-Encryption Scheme PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 330 - 346
- [27] Chosen-Ciphertext Secure Proxy Re-Encryption CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 185 - 194
- [28] Proxy Re-Encryption Based on Homomorphic Encryption 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
- [29] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225