共 50 条
- [41] Proxy Re-Encryption Based on Homomorphic Encryption 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
- [42] Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 210 - +
- [43] A Timed-Release E-Voting Scheme Based on Paillier Homomorphic Encryption IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2024, 9 (05): : 740 - 753
- [45] Incremental proxy re-encryption scheme for mobile cloud computing environment JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
- [47] Restricted CCA-secure Bidirectional Proxy Re-encryption Scheme PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 678 - 681
- [48] Efficient Unidirectional Proxy Re-Encryption PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
- [49] A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 293 - 307
- [50] A new proxy re-encryption scheme for protecting critical information systems Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 699 - 711