参考文献
[1]BLAZE M,BLEUMER G,STRAUSS M.Divertible Protocols and Atomic Proxy Cryptography[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,1998:127-144.
[2]苏铓,史国振,谢绒娜,等.面向移动云计算的多要素代理重加密方案[J].通信学报,2015,36(11):73-79.
[3]SUN J,HU Y.CCA-secure Unidirectional Proxy Broadcast Re-encryption in Thestandard Model[J].Journal of Computational Information Systems,2012,8(14):5909-5916.
[4]张维纬,张茹,刘建毅,等.高效的选择密文安全的单向代理重加密方案[J].通信学报,2013,34(7):87-97.
[5]翁健,陈泯融,杨艳江,等.无需随机预言机的自适应攻陷模型下选择密文安全的单向代理重加密方案[J].中国科学:信息科学,2010,40(2):298-312.
[6]邵俊.代理重密码的研究[D].上海:上海交通大学,2007.
[7]TANG Q.Type-based Proxy Re-encryption and Its Construction[C]//Proceedings of International Conference on Cryptology in India.Berlin,Germany:Springer,2008:130-144.
[8]WENG J,DENG R H,DING X,et al.Conditional Proxy Re-encryption Secure Against Chosen-ciphertext Attack[C]//Proceedings of the 4th International Symposium on Information,Computer,and Communications Security.New Yrok,USA:ACM Press,2009:322-332.
(下转第204页)
(上接第198页)
[9]JIA X,SHAO J,JING J,et al.CCA-secure Type-based Proxy Re-encryption with Invisible Proxy[C]//Proceedings of the 10th International Conference on Computer and Information Technology.Washington D.C.,USA:IEEE Press,2010:1299-1305.
[10]ZHAO J,FENG D G,YANG L,et al.CCA-secure Type-based Proxy Re-encryption Without Pairings[J].Dianzi Xuebao,2011,39(11):2513-2519.
[11]VIVEK S S,SELVI S S D,RADHAKISHAN V,et al.Efficient Conditional Proxy Re-encryption with Chosen Ciphertext Security[J].International Journal of Network Security & Its Applications,2012,4(2):179-199.
[12]GREEN M,ATENIESE G.Identity-based Proxy Re-encryption[C]//Proceedings of Applied Cryptography and Network Security.Berlin,Germany:Springer,2007:288-306.
[13]周德华.代理重加密体制的研究[D].上海:上海交通大学,2013.
[14]SHAO J,WEI G,LING Y,et al.Identity-based Conditional Proxy Re-encryption[C]//Proceedings of 2011 IEEE International Conference on Communications.Washington D.C.,USA:IEEE Press,2011:1-5.
[15]SHAO J,CAO Z.Multi-use Unidirectional Identity-based Proxy Re-encryption from Hierarchical Identity-based Encryption[J].Information Sciences,2012,206:83-95.
[16]WANG H,CAO Z,WANG L.Multi-use and Unidirectional Identity-based Proxy Re-encryption Schemes[J].Information Sciences,2010,180(20):4042-4059.
[17]EMURA K,MIYAJI A,OMOTE K.An Identity-based Proxy Re-encryption Scheme with Source Hiding Property,and Its Application to a Mailing-list System[C]//Proceedings of European Public Key Infrastructure Workshop.Berlin,Germany:Springer,2010:77-92.
[18]ATENIESE G,BENSON K,HOHENBERGER S.Key-private Proxy Re-encryption[C]//Proceedings of Cryptographers’ Track at the RSA Conference.Berlin,Germany:Springer, 2009:279-294.
[19]SHAO J,LIU P,ZHOU Y.Achieving Key Privacy Without Losing CCA Security in Proxy Re-encryption[J].Journal of Systems and Software,2012,85(3):655-665.
[20]YAU W C,PHAN R C W,HENG S H,et al.Proxy Re-encryption with Keyword Search:New Definitions and Algorithms[M].Berlin,Germany:Springer,2010:149-160.
[21]SHAO J,CAO Z,LIANG X,et al.Proxy Re-encryption with Keyword Search[J].Information Sciences,2010,180(13):2576-2587.
编辑索书志 |