共 8 条
[3]
Improved proxy re-encryption schemes with applications to secure distributed storage[J] . Giuseppe Ateniese,Kevin Fu,Matthew Green,Susan Hohenberger.ACM Transactions on Information and System Security (TISSEC) . 2006 (1)
[4]
A method for obtaining digital signatures and public-key cryptosystems[J] . R. L. Rivest,A. Shamir,L. Adleman.Communications of the ACM . 1978 (2)
[5]
Delegatable Homomorphic Encryption with Ap-plications to Secure Outsourcing of Computation .2 Manuel Barbosa,Pooya Farshim. CT-RSA . 2012
[6]
Efficient conditional proxy re-encryption with chosen-ciphertext security .2 Weng J,Yang Y J,Tang Q,et al. Information cecurity . 2009
[7]
IBM hybrid cloud solution .2 IBM. http://www-01.ibm.com/software/tivoli/products/hybrid-cloud . 2014
[8]
Information Security and Privacy .2 Chu C K,Weng J,Chow S S M,et al. Berlin . 2009