[1] BLAZE M,BLEUMER G,STRAUSS M.Divertible protocols and atomic proxy cryptography[C]//Proceedings of International Conference on the Theory and Application of Cryptographic Techniques.Berlin,Germany:Springer,1998:127-144. [2] ATENIESE G,FU K,GTEEN M,et al.Improved proxy re-encryption schemes with applications to secure distributed storage[J].ACM Transactions on Information and System Security,2006,9(1):1-30. [3] CANETTI R,HOHENBERGER S.Chosen-ciphertext secure proxy re-encryption[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:185-194. [4] CANARD S,DEVIGNE J,LAGUILLAUMIE F.Improving the security of an efficient unidirectional proxy re-encryption scheme[J].Journal of Internet Services and Information Security,2011,1(2):140-160. [5] CHOW S S M,WENG J,YANG Y J,et al.Efficient unidirectional proxy re-encryption[C]//Proceedings of International Conference on Cryptology in Africa.Berlin,Germany:Springer,2010:316-332. [6] LIN Hanyu.Secure content distribution using multi-hop proxy re-encryption[J].Wireless Personal Communications,2015,82(3):1449-1459. [7] GUO L F,YAU W C.Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage[J].Journal of Medical Systems,2015,39(2):11-11. [8] XU Jieru,CHEN Kefei,SHEN Zhonghua,et al.Improved certificate-based conditional proxy re-encryption scheme[J].Journal of Cryptologic Research,2018,5(4):344-358.(in Chinese)徐洁如,陈克非,沈忠华,等.改进的基于证书条件代理重加密方案[J].密码学报,2018,5(4):344-358. [9] SU Mang,WU Bin,FU Anmin,et al.Proxy re-encryption based assured update scheme of authorization for cloud data[J/OL].Journal of Software:1-11[2019-08-20].http://kns.cnki.net/kcms/detail/11.2560.TP.20190122.1348.002.html(in Chinese)苏铓,吴槟,付安民,等.基于代理重加密的云数据访问授权确定性更新方案[J/OL].软件学报:1-11[2019-08-20].http://kns.cnki.net/kcms/detail/11.2560.TP.20190122.1348.002.html [10] JIANG Mingming,GUO Yuyan,YU Lei,et al.Efficient identity-based proxy re-encryption on lattice in the standard model[J].Journal of Electronics & Information Technology,2019,41(1):61-66.(in Chinese)江明明,郭宇燕,余磊,等.有效的标准模型下格上基于身份的代理重加密[J].电子与信息学报,2019,41(1):61-66. [11] SHAO Jun,CAO Zhenfu,LIANG Xiaohui,et al.Proxy re-encryption with keyword search[J].Information Sciences,2010,180(13):2576-2587. [12] CHEN Xi,LI Yong.Efficient proxy re-encryption with private keyword searching in untrusted storage[J].International Journal of Computer Network and Information Security,2011,3(2):50-56. [13] GUO Lifeng,HU Lei.Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security[J].Computers & Mathematics with Applications,2012,63(1):151-157. [14] GUO Lifeng,LU Bo.Efficient proxy re-encryption with keyword search scheme[J].Journal of Computer Research and Development,2014,51(6):1221-1228. [15] RHEE H S,PARK J H,SUSILO W,et al.Trapdoor security in a searchable public-key encryption scheme with a designated tester[J].Journal of Systems and Software,2010,83(5):763-771. [16] WANG C H,TU T Y.Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server[J].Journal of Shanghai Jiaotong University(Science),2014,19(4):440-442. [17] LIU Zhenhua,ZHOU Peilin,DUAN Shuhong.Attribute-based proxy re-encryption scheme with keyword search[J].Journal of Electronics & Information Technology,2018,40(3):683-689.(in Chinese)刘振华,周佩琳,段淑红.支持关键词搜索的属性代理重加密方案[J].电子与信息学报,2018,40(3):683-689. [18] GUO Lifeng,LU Bo.Efficient proxy re-encryption with keyword search scheme[J].Journal of Computer Research and Development,2014,51(6):1221-1228.(in Chinese)郭丽峰,卢波.有效的带关键字搜索的代理重加密方案[J].计算机研究与发展,2014,51(6):1221-1228. [19] GUO Lifeng,LI Ting.Improved proxy re-encryption with keyword search scheme[J].Journal of Shanxi University(Natural Science Edition),2016,39(3):434-441.(in Chinese)郭丽峰,李婷.改进的带关键字搜索的代理重加密方案[J].山西大学学报(自然科学版),2016,39(3):434-441. [20] SHAO Jun,LIU Peng,CAO Zhenfu,et al.Multi-use unidirectional proxy re-encryption[C]//Proceedings of IEEE International Conference on Communications.Kyoto,Japan:[s.n.],2011:5-9. [21] HAN Xiao,ZENG Qi,CAO Yongming.An efficient proxy re-encryption scheme with keyword search[J].Computer and Modernization,2019(3):117-121.(in Chinese)韩笑,曾琦,曹永明.一种有效的带关键字搜索的代理重加密方案[J].计算机与现代化,2019(3):117-121. [22] YE Weiwei,OU Qingyu,WEI Wei.Provably secure identity-based conditional proxy re-encryption scheme[J].Computer Engineering,2017,43(9):194-198.(in Chinese)叶伟伟,欧庆于,魏巍.可证安全的基于身份条件代理重加密方案[J].计算机工程,2017,43(9):194-198. |