[1] |
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography[A]. UROCRYPT'98, International Con-ference on the Theory and Application of Cryptographic echniques[C]. Espoo, Finland, 1998. 127-144.
|
[2] |
ATENIESE G , FU K , GREEN M , et al . Improved proxy re-encryption chemes with applications to secure distributed storage[J]. ACM Transac-tions on Information System Security, 2006,(9): 1-30.
|
[3] |
SHAO J , LIU P , ZHOU Y . Achieving key privacy without losing CCA security in proxy re-encryption[J]. The Journal of Systems and Soft-ware, 2012,85:655-665.
|
[4] |
TABAN G , CáRDENAS A A , GLIGOR V D . Towards a secure and interoperable DRM architecture[A]. Proceedings of the ACM Work-shop on Digital Rights Management[C]. New York, USA, 2006. 69-78.
|
[5] |
LEE S , HEEJIN P , JONG K . A secure and mutual-profitable DRM interoperability scheme[A]. Proceedings of the IEEE Symposium on Computers and Communications[C]. Riccione, Italy, 2010. 75-80.
|
[6] |
SHAO J , CAO Z , LIANG X H , et al . Proxy re-encryption with key-word search[J]. Information Sciences, 2010,180(4):2576-2587.
|
[7] |
WANG X A , HUANG X Y , YANG X Y , et al . Further observation on proxy re-encryption with keyword search[J]. The Journal of Systems and Software, 2012,85:643-654.
|
[8] |
CANETTI R , HOHENBERGER S . Chosen-ciphertext secure proxy re-encryption[A]. Proceedings of the 14th ACM Conference on Computer and Communications Security[C]. Alexandria, VA, USA, 2007. 185-194.
|
[9] |
CANETTI R , HALEVI S , KATZ J . Chosen-ciphertext security from identity-based encryption[A]. EUROCRYPT'04[C]. Alexandria, VA, USA, 2007. 185-194.
|
[10] |
LIBERT B , VERGNAUD D . Unidirectional chosen-ciphertext secure proxy re-encryption[J]. IEEE transactions on Information theory, IEEE transactions on Information theory, 2011,57(3):1786-1802.
|
[11] |
WENG J , CHEN M R , YANG Y J , et al . CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles[J]. Science China(Information Sciences), 2010,53(3):593-606.
|
[12] |
HOHENBERGER S , WATERS B . Realizing hash-and-sign signatures under standard assumptions[A]. EUROCRYPT '09[C]. 2009. 333-350.
|
[13] |
CHEN L , CHENG Z , SMART N P . Identity-based key agreement protocols from pairings[J]. Journal of Information Security, 2007,6(4):213-241.
|
[14] |
SHAO J , CAO Z F . CCA-secure proxy re-encryption without pair-ings[A]. PKC 2009[C]. California, USA, 2009. 357-376.
|
[15] |
WENG J , DENG R H , LIU S L , et al . Chosen-ciphertext secure bidi-rectional proxy re-encryption schemes without pairings[J]. Information Sciences, 2010,180:5077-5089.
|
[16] |
CANETTI R , GOLDREICH O , HALEVI S . The random oracle me-thodology, revisited[J]. Journal of the ACM, 2004,51(4):557-594.
|
[17] |
SHAO J , CAO Z F . Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption[J]. Informa-tion Sciences, 2012,206(5):83-95.
|
[18] |
WANG H B , CAO Z F , WANG L C . Multi-use and unidirectional identity-based proxy re-encryption schemes[J]. Information Sciences, 2010,180:4042-4059.
|
[19] |
BELLARE M , ROGAWAY P . Optimal asymmetric encryption[A]. EUROCRYPT'94[C]. Perugia, Italy, 1995. 92-111.
|
[20] |
BONEH D . Simplified OAEP for the RSA and Rabin functions[A]. CRYPTO 2001[C]. California, USA, 2001. 275-291.
|
[21] |
BELLARE M , ROGAWAY P . The exact security of digital si na-tures-how to sign with RSA and rabin[A]. EUROCRYPT'96[C]. Za-ragoza, Spain, 1996. 399-416.
|
[22] |
HE D B , CHEN J H , HU J . An ID-based proxy signature schemes without bilinear pairings[J]. Ann Telecommun, 2011,66:657-662.
|