[1] ARMBUST M, FOX A, GRIFFITH R, et al. A view of cloud computing[J]. Communications of the ACM, 2010,53(4):50-58.
[2] BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[C]// Proceedings of 1998 International Conference on the Theory and Applications of Cryptographic Techniques. 1998:127-144.
[3] WENG J, DENG R H, CHU C, et al. Conditional proxy re-encryption secure against chosen-ciphertext attack[C]// Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. 2009:322-332.
[4] FANG L M, SUSILO W, WANG J D. Anonymous conditional proxy re-encryption without random oracles[C]// Proceedings of the 3rd International Conference on Provable Security. 2009:47-60.
[5] WENG J, CHEN M R, YANG Y J, et al. CCA-secrue unidirectional proxy re-encryption in the adaptive corruption model without random oracles[J]. Science China:Information Sciences, 2010,53(3):593-606.
[6] SHAO J, CAO Z F. CCA-secure proxy re-encryption without pairings[C]// Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography. 2009:357-376.
[7] CHOW S S, WENG J, YANG Y, et al. Efficient unidirectional proxy re-encryption[C]// Proceedings of the 3rd International Conference on Cryptology in Africa.2010:316-332.
[8] HU X, TANG C M, ZHENG X H, et al. Efficient pairing-free PRE schemes for multimedia data sharing in IOT[J]. Multimedia Tools and Applications, 2018,77(14):18327-18354.
[9] SHAO J, CAO Z F, LIANG X H, et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010,180(13):2576-2587.
[10]CHEN X, LI Y. Efficient proxy re-encryption with private keyword searching in untrusted storage[J]. International Journal of Computer Network and Information Security, 2011,3(2):50-56.
[11]LEE S H, LEE I Y. A study of practical proxy re-encryption with a keyword search scheme considering cloud storage structure[J]. The Scientific World Journal, 2014,2014:Article ID 615679.
[12]〖JP2〗GUO L F, HU L. Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security[J]. Computers and Mathematics with Applications, 2012,63(1):151-157.
[13]〖JP2〗CHEN Z H, LI S D, HUANG Q, et al. A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage[J]. Concurrency and Computation: Practice and Experience, 2016,28(10):2858-2876.
[14]汤永利,吴翔,叶青,等. 云环境下一种带关键字搜索的代理重加密方案[J]. 小型微型计算机系统, 2017,38(10):2247-2252.
[15]ZHANG B, ZHANG F G. An efficient public key encryption with conjunctive-subset keywords search[J]. Journal of Network and Computer Applications, 2011,34(1):262-267.
[16]HWANG M S, HSU S T, LEE C C. A new public key encryption with conjunctive field keyword search scheme[J]. Information Technology and Control, 2014,43(3):277-288.
[17]BONEH D, WATERS B. Conjunctive, subset, and range queries on encrypted data[C]// Proceedings of the 4th International Conference on Theory of Cryptography. 2007:535-554.
[18]方黎明. 带关键字搜索公钥加密的研究[D]. 南京:南京航空航天大学, 2011.
[19]WANG X A, HUANG X Y, YANG X Y, et al. Further observation on proxy re-encryption with keyword search[J]. Journal of Systems and Software, 2012,85(3):643-654.
[20]许盛伟,王荣荣,李新玉. 支持文件动态更新的局域属性可搜索加密方案[J]. 计算机应用研究, 2018,35(11):3418-3423.
[21]GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grainted access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006:89-98.
[22]徐海琳,陆阳. 高效的基于证书代理重加密方案[J]. 计算机工程与应用, 2017,53(14):80-86.
[23]黄刘生,田苗苗,黄河. 大数据隐私保护密码技术研究综述[J]. 软件学报, 2015,26(4):945-959. |