共 12 条
[1]
Improved proxy re-encryption schemes with applications to secure distributed storage. Ateniese G,Fu K,Green M,et al. Proc of the 12th Annual Network and Distributed System . 2005
[2]
Provable datapossession at untrusted stores. Ateniese G,Burns R C,Curtmola R,et al. Proceedings of the 14thACM Conference on Computer and Communications Security . 2007
[3]
Identity based encryption from the Weil pairing. Boneh D,Franklin M. SIAM Journal on Computing . 2003
[5]
代理重密码的研究[D]. 邵俊.上海交通大学 2007
[8]
Divertible protocols and atomic proxy cryptography. BLAZE M,BLEUMER G,STRAUSS M. Advances in Cryogenic Engineering . 1998
[9]
Chosen-ciphertext security from identity-based encryption. Ran Canetti,,Shai Halevi,,and Jonathan Katz. Advances in Cryptology - EUROCRYPT.2004 . 2004
[10]
Identity based encryption from the weil pairing. Boneh D,Franklin M. Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology . 2001