1. Nuñez D, Agudo I, Lopez J. Proxy re-encryption: analysis of constructions and its application to secure access delegation. Journal of Network and Computer Applications, 2017, 87: 193 - 209
2. Nuñez D. Umbral: a threshold proxy re-encryption scheme. Malaga, Spain: NuCypher Inc and NICS Lab, University of Malaga, 2018
3. Egorov M, Wilkison M L, Nuñez D. Nucypher KMS: decentralized key management system. arXiv Preprint, 2007, arXiv:1707. 06140
4. Zyskind G, Nathan O, Pentland A. Enigma: decentralized computation platform with guaranteed privacy. arXiv Preprint, 2015, arXiv:1506. 03471
5. Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public key encryption with keyword search. Advances in Cryptology: Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques ( EUROCRYPT’04 ), 2004, May 2 - 6, Interlaken, Switzerland. LNCS 3027. Berlin, Germany: Springer, 2004: 506 - 522
6. Shao J, Cao Z F, Liang X H, et al. Proxy re-encryption with keyword search. Information Sciences, 2010, 180 ( 13 ): 2576 -2587
7. Waters B R, Balfanz D, Durfee G, et al. Building an encrypted and searchable audit log. Proceedings of the 11th Annual Network and Distributed System Security Symposium ( NDSS’04 ), 2004, Feb 5 - 6, San Diego, CA, USA. Reston, VA, USA: Internet Society, 2004: 1 - 10
|