[1] ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing[J]. Communications of the ACM, 2010,53(4):50-58.
[2] BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[C]// Proceedings of 1998 International Conference on the Theory and Applications of Cryptographic Techniques. 1998:127-144.
[3] SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of 2000 IEEE Symposium on Security and Privacy. 2000:44-55.
[4] BONEH D, CRESCENZO G D, OSTROVSKY R, et al. Public key encryption with keyword search[C]// Proceedings of 2004 International Conference on the Theory and Applications of Cryptographic Techniques. 2004:506-522.
[5] SHAO J, CAO Z F, LIANG X H, et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010,180(13):2576-2587.
[6] ATENIESE G, FU K, GREEN M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security, 2006,9(1):1-30.
[7] CANETTI R, HOHENBERGER S. Chosen ciphertext secure proxy re-encryption[C]// Proceedings of 2007 ACM Conference on Computer and Communications Security. 2007:185-194.
[8] LIBERT B, VERGNAUD D. Unidirectional chosen ciphertext secure proxy re-encryption[C]// Proceedings of 2008 International Workshop on Public Key Cryptography. 2008:360-379
[9] WENG J, ZHAO Y, HANAOKA G. On the security of a bidirectional proxy re-encryption scheme from PKC 2010[C]// Proceedings of the Public Key Cryptography. 2011:284-295.
[10]CANARD S, DEVIGNE J, LAGUILLAUMIE F. Improving the security of an efficient unidirectional proxy re-encryption scheme[J]. Journal of Internet Services and Information Security, 2011,1(2):140-160.
[11]CHOW S M, WENG J, YANG Y J, et al. Efficient unidirectional proxy re-encryption[C]// Proceedings of 2010 International Conference on Cryptology in Africa. 2010:316-332.
[12]SHAO J, LIU P, CAO Z F, et al. Multi-use unidirectional proxy re-encryption[C]// Proceedings of 2011 International Conference on Communications. 2011:1-5.
[13]TANG Z, ZHANG W. Multiparty cloud computation and homo-morphic proxy re-encrypt scheme[J]. Journal of Chinese Computer Systems, 2015,36(8):1739-1742.
[14]WANG H B, CAO Z F, WANG L. Multi-use and unidirectional identity-based proxy re-encryption schemes[J]. Information Sciences, 2010,180(20):4042-4059.
[15]CHEN X, LI Y. Efficient proxy re-encryption with private keyword searching in untrusted storage[J]. International Journal of Computer Network and Information Security, 2011,3(2):50-56.
[16]LEE S H, LEE I Y. A study of practical proxy re-encryption with a keyword search scheme considering cloud storage structure[J]. Scientific World Journal, 2014(2):1661-1667.
[17]GUO L F, HU L. Efficient bidirectional proxy re-encryption with direct chosen ciphertext security[J]. Computers and Mathematics with Applications, 2012,63(1):151-157.
[18]GUO L F, LU B. Efficient proxy re-encryption with keyword search scheme[J]. Journal of Computer Research and Development, 2014,51(6):1221-1228.
[19]RHEE H S, PARK J H, SUSILO W, et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010,83(5):763-771.
[20]DENG R H, WENG J, LIU S L, et al. Chosen-ciphertext secure proxy re-encryption without pairings[C]// Proceedings of International Conference on Cryptology and Network Security. 2008:1-17.
[21]ABDALLA M, BELLARE M, CATALANO D, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions[J]. Journal of Cryptology, 2008,21(3):350-391.
[22]王刚,李非非,王瑶. 指定服务器的基于身份加密连接关键字搜索方案[J]. 计算机与现代化, 2017(4):118-121.
[23]郭丽峰,卢波. 有效的带关键字搜索的代理重加密方案[J]. 计算机研究与发展, 2014,51(6):1221-1228. |