参考文献
[1]严骏.云计算安全研究[J].数字图书馆论坛,2009,22(9):71-83.
[2]房晶,吴昊,白松林.云计算安全研究综述[J].电信科学,2011,27(4):37-42.
[3]Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[C]//Proceedings of International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer,2003:452-473.
[4]Green M,Ateniese G.Identity-based Proxy Re-encryp-tion[C]//Proceedings of the 5th International Conference on Applied Cryptography and Network Security.Berlin,Germany:Springer,2007:288-306.
[5]Blaze M,Bleumer G,Strauss M.Divertible Protocols and Atomic Proxy Cryptography[C]//Proceedings of EUROCRYPT’98.Berlin,Germany:Springer,1998:127-144.
[6]Ateniese G,Fu K,Green M,et al.Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage[J].ACM Transactions on Information & System Security,2006,9(1):1-30.
[7]Taban G,Rdenas A A,Gligor V D.Towards a Secure and Interoperable DRM Architecture[C]//Proceedings of ACM Workshop on Digital Rights Management.New York,USA:ACM Press,2006:69-78.
[8]Canetti R,Hohenberger S.Chosen-ciphertext Secure Proxy Re-encryption[C]//Proceedings of ACM Con-ference on Computer and Communications Security.New York,USA:ACM Press,2007:185-194.
[9]张维纬,张茹,刘建毅,等.高效的选择密文安全的单向代理重加密方案[J].通信学报,2013,34(7):87-97.
[10]Libert B,Vergnaud D.Unidirectional Chosen-ciphertext Secure Proxy Re-encryption[J].IEEE Transactions on Information Theory,2011,57(3):1786-1802.
[11]彭伟.面向云计算安全的同态加密技术应用研究[D].重庆:重庆大学,2014.
[12]苏铓,史国振,谢绒娜,等.面向移动云计算的多要素代理重加密方案[J].通信学报,2015,36(11):73-79.
[13]周潭平,杨海滨,杨晓元,等.一个全同态代理重加密方案[J].四川大学学报(工程科学版),2016,48(1):99-105.
[14]Shao J,Cao Z.CCA-secure Proxy Re-encryption Without Pairings[C]//Proceedings of PKC’09.Berlin,Germany:Springer,2009:357-376.
[15]翁健,陈泯融,杨艳江,等.无需随机预言机的自适应攻陷模型下选择密文安全的单向代理重加密方案[J].中国科学:信息科学,2010,40(2):298-312.
[16]Weng J,Deng R H,Ding X,et al.Conditional Proxy Re-encryption Secure Against Chosen-ciphertext Attack[C]//Proceedings of ACM Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2009:322-332.
编辑陆燕菲 |