[1] BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[C]//Proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques. Berlin:Springer, 1998:127-144. [2] ATENIESE G, FU K, GREEN M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security, 2006, 9(1):1-30. [3] CANETTI R, HOHENBERGER S. Chosen-ciphertext secure proxy re-encryption[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM, 2007:185-194. [4] LIBERT B, VERGNAUD D. Unidirectional chosen-ciphertext se-cure proxy re-encryption[C]//Proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography. Berlin:Springer, 2008:360-379. [5] SHAO J, CAO Z. CCA-secure proxy re-encryption without pairings[C]//Proceedings of the 12th International Workshop on Practice and Theory in Public-Key Cryptography. Berlin:Springer, 2009:357-376. [6] GREEN M, ATENIESE G. Identity-based proxy re-encryption[C]//Proceedings of the 5th International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2007:288-306. [7] MATSUO T. Proxy re-encryption systems for identity-based encryption[C]//Proceedings of the 1st International Conference on Pairing-Based Cryptography. Berlin:Springer, 2007:247-267. [8] LUO S, SHEN Q, CHEN Z. Fully secure unidirectional identity-based proxy re-encryption[C]//Proceedings of the 14th Annual International Conference on Information Security and Cryptology. Berlin:Springer, 2012:109-126. [9] LIANG K, LIU J K, WONG D S, et al. An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing[C]//Proceedings of the 19th European Symposium on Research in Computer Security. Berlin:Springer, 2014:257-272. [10] SUR C, PARK Y, SHIN S U, et al. Certificate-based proxy re-encryption for public cloud storage[C]//Proceedings of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Piscataway, NJ:IEEE, 2013:159-166. [11] GENTRY C. Certificate-based encryption and the certificate revocation problem[C]//Proceedings of 2003 International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2003:272-293. [12] WANG L, SHAO J, CAO Z, et al. A certificate-based proxy cryptosystem with revocable proxy decryption power[C]//Proceedings of the 8th International Conference on Cryptology in India. Berlin:Springer, 2007:297-311. [13] GALINDO D, MORILLO P, RÀFOLS C. Improved certificate-based encryption in the standard model[J]. Journal of Systems and Software, 2008, 81(7):1218-1226. [14] LIU J K, ZHOU J Y. Efficient certificate-based encryption in the standard model[C]//Proceedings of the 6th International Conference on Security and Cryptography for Networks. Berlin:Springer, 2008:144-155. [15] LU Y, LI J G, XIAO J M. Constructing efficient certificate-based encryption with pairing[J]. Journal of Computers, 2009, 4(1):19-26. [16] SHAO Z. Enhanced certificate-based encryption from pairings[J]. Computers & Electrical Engineering, 2011, 37(2):136-146. [17] YAO J, LI J G, ZHANG Y. Certificate-based encryption scheme without pairing[J]. KSⅡ Transactions on Internet and Information Systems, 2013, 7(6):1480-1491. [18] LU Y, LI J G. Efficient construction of certificate-based encryption secure against public key replacement attacks in the standard model[J]. Journal of Information Science and Engineering, 2014, 30(5):1553-1568. [19] LI J G, ZHAO X, ZHANG Y. Certificate-based conditional proxy re-encryption[C]//Proceedings of the 8th International Conference on Network and System Security. Berlin:Springer, 2014:299-310. [20] BOYEN X. The BB1 identity-based cryptosystem:a standard for encryption and key encapsulation[EB/OL].[2015-06-10]. http://grouper.ieee.org/groups/1363/IBC/submissions. |