[1] CHU C K,CHOW S S M,TZENG W G,et al.Key-aggregate cryptosystem for scalable data sharing in cloud storage[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(2):468-477. [2] LEE B.Unified public key infrastructure supporting both certificate-based and ID-based cryptography[C]//ARES 2010:Proceedings of the 2010 International Conference on Availability,Reliability,and Security.Piscataway,NJ:IEEE,2010:54-61. [3] DELERABLÉE C.Identity-based broadcast encryption with constant size ciphertexts and private keys[C]//Proceedings of the 200713th International Conference on the Theory and Application of Cryptology and Information Security,LNCS 4833.Berlin:Springer,2007:200-215. [4] BONEH D,BOYEN X.Efficient selective-id secure identity-based encryption without random oracles[C]//Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 3027.Berlin:Springer,2004:223-238. [5] DENG H,WU Q D,QIN B,et al.Tracing and revoking leaked credentials:accountability in leaking sensitive outsourced data[C]//Proceedings of the 20149th ACM Symposium on Information Computer and Communications Security.New York:ACM,2014:425-434. [6] WANG L H,WANG L C,MAMBO M,et al.Identity-based proxy cryptosystems with revocability and hierachical confidentialities[C]//ICICS 2010:Proceedings of the 12th International Conference on Information and Communications Security,LNCS 6476.Berlin:Springer,2010:383-400. [7] BLAZE M,BLEUMER G,STRAUSS M.Divertible protocols and atomic proxy cryptography[C]//Proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques,LNCS 1403.Berlin:Springer,1998:127-144. [8] CHU C K,TZENG W G.Identity-based proxy re-encryption without random oracles[C]//ISC 2007:Proceedings of the 10th International Conference on Information Security,LNCS 4779.Berlin:Springer,2007:189-202. [9] 崔宁,李艳琼.基于双线性对的无证书代理重加密方案[J].信息技术,2013(7):34-36.(CUI N,LI Y Q.A cerfiticateless proxy re-encryption scheme from pairings[J].Information Technology,2013(7):34-36.) [10] SRINIVASAN A,RANGAN C P.Certificateless proxy re-encryption without pairing:revisited[C]//SCC 2015:Proceedings of the 3rd International Workshop on Security in Cloud Computing.New York:ACM,2015:41-52. [11] LIANG K,LIU J K,WONG D S,et al.An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing[C]//Proceedings of the 201419th European Symposium on Research in Computer Security,LNCS 8712.Berlin:Springer,2014:257-272. [12] DENG H,WU Q H,QIN B,et al.Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data[C]//Proceedings of the 10th ACM Symposium on Information,Computer and Communications Security.New York:ACM,2015:393-404. [13] GREEN M,HOHENBERGER S,WATERS B.Outsourcing the decryption of ABE ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security.Berkeley:USENIX Association,2011:34. [14] MATSUO T.Proxy re-encryption systems for identity-based encryption[C]//Proceedings of the First International Conference on Pairing-Based Cryptography,LNCS 4575.Berlin:Springer,2007:247-267. [15] LUO S,HU J B,CHEN Z.Ciphertext policy attribute-based proxy re-encryption[C]//Proceedings of the 12th International Conference on Information and Communications Security,LNCS 6476.Berlin:Springer,2010:401-415. [16] SHAO J,LU R X,LIN X D.Fine-grained data sharing in cloud computing for mobile devices[C]//Proceedings of the 2015 IEEE Conference on Computer Communications.Piscataway,NJ:IEEE,2015:2677-2685. [17] LYNN B.The Stanford pairing based cryptography library[EB/OL].[2015-11-20].http://crypto.stanford.edu/pbc. |