相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Computer Science, Information Systems
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
Weng Jian et al.
SCIENCE CHINA-INFORMATION SCIENCES (2010)