[1]
G. Ateniese, K. Fu, M. Green, S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage. NDSS'05, The Internet Society, 29-43 (2005).
DOI: 10.1145/1127345.1127346
Google Scholar
[2]
M. Blaze, G. Bleumer, M. Strauss. Divertible protocols and atomic proxy cryptography. EUROCRYPT'98. LNCS, vol. 1403, 127-144, Springer (1998).
DOI: 10.1007/bfb0054122
Google Scholar
[3]
D. Boneh, M. Franklin. Identity-based encryption from the Weil Pairing. SIAM Journal of Computing, 32 (3): 586-615 (2003).
DOI: 10.1137/s0097539701398521
Google Scholar
[4]
R. Canetti, S. Hohenberger, Chosen-ciphertext secure proxy re-encryption. ACM Conference on Computer and Communications Security, 185-194, ACM (2007).
DOI: 10.1145/1315245.1315269
Google Scholar
[5]
R. Cramer, V. Shoup. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack, CRYPTO'98, LNCS, vol. 1462, 13-25. Springer (1998).
DOI: 10.1007/bfb0055717
Google Scholar
[6]
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms, CRYPTO'84, LNCS, vol. 196, 10-18. Springer (1984).
DOI: 10.1007/3-540-39568-7_2
Google Scholar
[7]
B. Libert, D. Vergnaud, Unidirectional chosen-ciphertext secure proxy re-encryption. PKC 2008. LNCS, vol 4939, 360-379, Springer (2008).
DOI: 10.1007/978-3-540-78440-1_21
Google Scholar
[8]
A. Menezes, P. Oorschot and S. Vanstone, Handbook of applied cryptography, CRC Press (1996).
Google Scholar