[1] |
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography[C]// Advances in Cryptology — EUROCRYPT. 1998: 127-144.
|
[2] |
XAGAWA K . Cryptography with lattices[D]. Tokyo:Tokyo Institute of Technology, 2010.
|
[3] |
AONO Y , BOYEN X , PHONG T L ,et al. Key-private proxy re-encryption under LWE[C]// Progress in Cryptology -INDOCRYPT. 2013: 1-18.
|
[4] |
SINGH K , PANDU R C , BANERJEE A K . Cryptanalysis of unidirectional proxy re-encryption scheme[C]// Information and Communication Technology. 2014: 564-575.
|
[5] |
NISHIMAK R , XAGAWA K . Key-private proxy re-encryption from lattices,revisited[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2015,E98-A(1): 100-116.
|
[6] |
JIANG M M , HU Y P , WANG B C ,et al. Lattice-based multi-use unidirectional proxy re-encryption[J]. Security and Communication Networks, 2015,8(18): 3796-3803.
|
[7] |
KIRSHANOVA E , . Proxy re-encryption from lattices[C]// Public-Key Cryptography–PKC. 2014: 77-94.
|
[8] |
周潭平, 杨海滨, 杨晓元 ,等. 一个全同态代理加密方案[J]. 四川大学学报(工程科学版), 2016,48(1): 99-105.
|
|
ZHOU T P , YANG H B , YANG X Y ,et al. A fully homomorphic proxy re-encryption scheme based on LWE[J]. Journal of Sichuan University (Engineering Science Edition), 2016,48(1): 99-105.
|
[9] |
SINGH K C , RANGAN P , BANERJEE A K . Lattice based identity based unidirectional proxy re-encryption scheme[C]// Security,Privacy,and Applied Cryptography Engineering. 2014: 76-91.
|
[10] |
苏铓, 历国振, 谢荣娜 ,等. 面向移动云计算的多要素代理重加密方案[J]. 通信学报, 2015,36(11): 73-79.
|
|
SU M , LI G Z , XIE R N ,et al. Multi-element based on proxy re-encryption scheme for mobile cloud computing[J]. Journal on Communications, 2015,36(11): 73-79.
|
[11] |
REGEV O , . On lattices,learning with errors,random linear codes,and cryptography[C]// The 37th annual ACM Symposium on Theory of Computing. 2005: 84-93.
|
[12] |
LINDNER R , PEIKERT C . Better key sizes (and attacks) for LWE-based encryption[C]// Topics in Cryptology–CT-RSA. 2011: 319-339.
|
[13] |
GENTRY C , HALEVI S , VAIKUNTANATHAN V . A simple BGN-type cryptosystem from LWE[C]// Advances in Cryptology–Eurocrypt. 2010: 506-522.
|
[14] |
DESMEDT Y , YAIR F Y . Threshold cryptosystems[C]// Proceedings of Advances in Cryptology-CRYPTO. 1989: 307-315.
|
[15] |
HANAOKA G , KAWAI Y , KUNIHIRO N ,et al. Generic construction of chosen ciphertext secure proxy re-encryption[C]// Cryptographers’ Track at the RSA Conference. 2012: 349-364.
|
[16] |
SINGH K C , RANGAN P , BANERJEE A K . Lattice-based identity-based resplittable threshold public key encryption scheme[J]. International Journal of Computer Mathematics, 2016,93(2): 289-307.
|
[17] |
楼圣铭, 曹珍富 . 基于身份的门限多代理者的代理重加密方案[J]. 黑龙江大学自然科学学报, 2010,27(2): 151-156.
|
|
LOU S M , CAO Z F . Identity-based proxy re-encryption with threshold multi-proxy[J]. Journal of Natural Science of Heilongjiang University, 2010,27(2): 151-156.
|
[18] |
GENTRY C , SAHAIY A , WATERS B . Homomorphic encryption from learning with errors:conceptually-simpler,asymptotically-faster,Attribute-based[C]// Advances in Cryptology-Crypto. 2013: 75-92.
|