Certificateless Public Key Cryptography, Advances in Cryptology -Asiacrypt 2003, pp.452-473, 2003. ,
DOI : 10.1007/978-3-540-40061-5_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328
CBE from CL-PKE: A Generic Construction and Efficient Schemes, Public Key Cryptography -PKC 2005, pp.398-415, 2005. ,
DOI : 10.1007/978-3-540-30580-4_27
Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security, vol.9, issue.1, pp.1-30, 2006. ,
DOI : 10.1145/1127345.1127346
Key-Private Proxy Re-encryption, Cryptography ePrint Archive Report, vol.463, 2008. ,
DOI : 10.1007/978-3-540-78440-1_21
Certificateless Public Key Encryption Without Pairing, ISC 2005, pp.134-148, 2005. ,
DOI : 10.1007/11556992_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.3092
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Divertible protocols and atomic proxy cryptography, Advances in Cryptology -Eurocrypt' 98, LNCS 1403, pp.127-144, 1998. ,
DOI : 10.1007/BFb0054122
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.8246
Efficient selective-id secure identity based encryption without random oracles Advances in Cryptology -Eurocrypt, LNCS, vol.3027, pp.223-238, 2004. ,
Identity-based encryption from the weil paring Advances in Cryptology -Crypto, LNCS, vol.2139, pp.213-229, 2001. ,
Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315269
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.3857
Chosen-ciphertext secure proxy reencryption without pairings, CANS 2008, pp.1-17, 2008. ,
DOI : 10.1007/978-3-540-89641-8_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.3091
How to Enhance the Security of Public-Key Encryption at Minimum Cost, Public Key Cryptography -PKC' 99, pp.53-68, 1999. ,
DOI : 10.1007/3-540-49162-7_5
Identity-Based Proxy Re-encryption, Cryptography ePrint Archive Report, p.473, 2006. ,
DOI : 10.1007/978-3-540-72738-5_19
On Constructing Certificateless Cryptosystems from Identity Based Encryption, Public Key Cryptography -PKC 2006, pp.474-490, 2006. ,
DOI : 10.1007/11745853_31
Unidirectional chosen-ciphertext secure proxy reencryption, Public Key Cryptography -PKC 2008, pp.360-379, 2008. ,
DOI : 10.1007/978-3-540-78440-1_21
URL : https://hal.archives-ouvertes.fr/inria-00339530
CCA-Secure Proxy Re-encryption without Pairings, Public Key Cryptography -PKC 2009, pp.357-376, 2009. ,
DOI : 10.1007/978-3-642-00468-1_20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.218.9939