Citation: | ZHOU Dehua, CHEN Kefei, LIU Shengli, ZHENG Dong. Identity-Based Conditional Proxy Re-Encryption[J]. Chinese Journal of Electronics, 2013, 22(1): 61-66. |
M. Blaze, G. Bleumer and M. Strauss, “Divertible protocols andatomic proxy cryptography”, Proc. of Eurocrypt’98, Springer-Verlag, LNCS 1403, Espoo, Finland, pp.127-144, 1998.
|
G. Ateniese, K. Fu, M. Green and S. Hohenberger, “Improvedproxy re-encryption schemes with applications to secure distributedstorage”, Proc. of NDSS 2005, San Diego, California,USA, pp.29-43, 2005.
|
G. Ateniese, K. Fu, M. Green and S. Hohenberger, “Improvedproxy re-encryption schemes with applications to secure distributedstorage”, ACM Transactions on Information and SystemSecurity (TISSEC), Vol.9, No.1, pp.1-30, 2006.
|
R. Caneti R and S. Hohenberger, “Chosen-ciphertext secureproxy re-encryption”, Proc. of ACM CCS 2007, ACM Press,Alexandria, VA, USA, pp.185-194, 2007.
|
B. Libert B and D. Vergnaud, “Unidirectional chosen-ciphertextsecure proxy re-encryption”, Proc. of PKC’08, Springer-Verlag,LNCS 4929, Barcelona, Spain, pp.360-379, 2008.
|
R.H. Deng, J. Weng, S. Liu and K. Chen, “Chosen-cipertext secureproxy re-encryption without pairings”, Proc. of CANS’08,Springer-Verlag, LNCS 5339, Hong Kong, China, pp.1-17, 2008.
|
J. Weng, S. Chow, Y. Yang and R.H. Deng, “Efficient unidirectionalproxy re-encryption”, Cryptology ePrint Archive, Report2009/189. 2009.
|
J. Zhao, D. Feng, L. Yang and L. Ma, “CCA-secure type-basedproxy re-encryption without pairings”, Acta Electronica Sinica,Vol.39, No.11, pp.2513-2519, 2011. (in Chinese)
|
M. Green and G. Ateniese, “Identity-based proxy reencryption”,Proc. of ACNS’07, Springer-Verlag, LNCS 4521,Zhuhai, China, pp.288-306, 2007.
|
M. Mambo and E. Okamoto, “Proxy cryptosystems: Delegationof the power to decrypt ciphertexts”, IEICE Trans. Fund.Electronics Communications and Computer Science, Vol.E80-A, No.1, pp.54-63, 1997.
|
J. Weng, M. Chen, Y. Yang, R.H. Deng, K. Chen and F. Bao,“CCA-secure unidirectional proxy re-encryption in the adaptivecorruption model without random oracles”, Science China: InformationScience, Vol.53, No.3, pp.593-606, 2010.
|
B. Libert B and D. Vergnaud, “Tracing malicious proxies inproxy re-encryption”, Proc. of Pairing’08, Springer-Verlag,LNCS 5209, Egham, UK, pp.332-353, 2008.
|
J. Weng, R.H. Deng, X. Ding, C. Chu and J. Lai, “Conditionalproxy re-encryption secure against chosen-ciphertext attack”,Proc. of ASIACCS’09, ACM Press, Sydney, Australia, pp.322-332, 2009.
|
T. Matsuo, “Proxy re-encryption systems for identity-based encryption”,Proc. of Paring’07, LNCS 4575, Springer-Verlag,Tokyo, Japan, pp.247-267, 2007.
|
T. ElGamal, “A public-key cryptosystem and a signaturescheme based on discrete logarithms”, Proc.of Crypto’84,Springer-Verlag, LNCS 196, Santa Barbara, California, USA,pp.10-18, 1984.
|
D. Boneh and X. Boyen, “Efficient selective-ID secure identitybased encryption without random oracles”, Proc.of Eurocrypt’04, Springer-Verlag, LNCS 3027, Interlaken, Switzerland,pp.223-238, 2004.
|
D. Boneh, E.J. Goh and T. Matsuo, “Proposal for P1363.3proxy re-encryption”, http://grouper.ieee.org/groups/1363/IBC/submissions/NTTDataProposal -for-P1363.3-2006-08-14.pdf.
|
D. Boneh and M. Franklin, “Identity based encryption from theWeil pairing”, Proc.of Crypto’01, Springer-Verlag, LNCS 2139,Santa Barbara, California, USA, pp.213-229, 2001.
|
C. Chu and W. Tzeng, “Identity-based proxy re-encryptionwithout random oracles”, Proc. of ISC’07, Springer-Verlag,LNCS 4779, Valparaíso, Chile, pp.189-202, 2007.
|
B. Waters, “Efficient identity-based encryption without randomoracles”, Proc. of Eurocrypt’05, Springer-Verlag, LNCS 3494,Aarhus, Denmark, pp.114-127, 2005.
|
J. Weng, Y. Yang, Q. Tang, R.H. Deng and F. Bao, “Efficientconditional proxy re-encryption with chosen-ciphertext security”,Proc. of ISC’09, Springer-Verlag, LNCS 5735, Pisa, Italy,pp.151-166, 2009.
|
R. Canetti, H. Krawczyk and J.B. Nielsen, “Relaxing chosenciphertextsecurity”, Proc.of Crypto’03, Springer-Verlag, LNCS2729, Santa Barbara, California, USA, pp.565-582, 2003.
|
R. Canetti, S. Halevi and J. Katz, “Chosen-ciphertext securityfrom identity-based encryption”, Proc. of Eurocrypt’04,Springer-Verlag, LNCS 3027, Interlaken, Switzerland, pp.207-222, 2004.
|