[1] BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography [C]// Proceedings of Advances in Cryptology — European Cryptology Conference ' 98, LNCS 1403. Berlin: Springer, 1998: 127-144. [2] BOLDYREVA A, FISCHLIN M, PALACIO A, et al. A closer look at PKI: security and efficiency [C]// PKC '07: Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography. Berlin: Springer, 2007: 458-475. [3] WANG L, WANG L, MAMBO M, et al. Identity-based proxy cryptosystems with revocability and hierachical confidentialities [C]// SORIANO M, QING S, LÓPEZ J. Information and Communications Security, LNCS 6476. Berlin: Springer, 2010:383-400. [4] CHU C K, WENG J, CHOW S S M, et al. Conditional proxy broadcast re-encryption [C]// Proceedings of the 2009 Information Security and Privacy, LNCS 5594. Berlin: Springer, 2009: 327-342. [5] XU P, JIAO T, WU Q, et al. Conditional identity-based broadcast proxy re-encryption and its application to cloud e-mail [J]. IEEE Transactions on Computers, 2016, 65(1): 66-79. [6] SHAO J, WEI G, LING Y, et al. Identity-based conditional proxy re-encryption [C]// Proceedings of the 2011 IEEE International Conference on Communications. Piscataway, NJ: IEEE, 2011: 1-5. [7] LIANG K, LIU Z, TAN X, et al. A CCA-secure identity-based conditional proxy re-encryption without random oracles [C]// ICISC '12: Proceedings of the 15th International Conference on Information Security and Cryptology, LNCS 7839. Berlin: Springer, 2013: 231-246. [8] LIANG K, HUANG Q, SCHLEGEL R, et al. A conditional proxy broadcast re-encryption scheme supporting timed-release [C]// ISPEC 2013: Proceedings of the International Conference on Information Security Practice and Experience, LNCS 7863. Berlin: Springer, 2013: 132-146. [9] LIANG K, CHU C K, TAN X, et al. Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertext [J]. Theoretical Computer Science, 2014, 539(9): 87-105. [10] LI J, ZHAO X, ZHANG Y. Certificate-based Conditional Proxy Re-encryption [M]// AU M H, CARMINATI B, KOU C C J. Network and System Security, LNCS 8792. Berlin: Springer, 2014: 299-310. [11] DELERABLÉE C. Identity-based broadcast encryption with constant size ciphertexts and private keys [C]// Proceedings of the 2007 Annual International Conference on the Theory and Application of Cryptology and Information Security, LNCS 4833. Berlin: Springer, 2007: 200-215. [12] DENG H, WU Q, QIN B, et al. Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data [C]// ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2015: 393-404. [13] BONEH D, BOYEN X. Efficient selective-id secure identity-based encryption without random oracles [C]// EUROCRYPT 2004: Proceedings of the 2004 European Cryptology Conference, LNCS 3027. Berlin: Springer, 2004: 223-238. |