共 50 条
- [3] How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 95 - 98
- [4] Efficient IBE-PKE proxy re-encryption SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 285 - +
- [6] Identity Based Proxy Re-encryption From BB1 IBE JOURNAL OF COMPUTERS, 2013, 8 (06) : 1618 - 1626
- [7] Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 85 - 98
- [8] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575
- [9] Proxy Re-encryption with Unforgeable Re-encryption Keys CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33