[1] M Blaze,G Bleumer,M Strauss.Divertible protocols and atomic proxy cryptography[A].International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin:Springer,1998.127-144.
[2] G Ateniese,K Fu,M Green,et al.Improved proxy reencryption schemes with applications to secure distributed storage[J].ACM Transactions on Information and System Security (TISSEC),2006,9(1):1-30.
[3] Xagawa K.Cryptography with Lattices[D].Tokyo:Tokyo Institute of Technology,2010.
[4] Aono Y,Boyen X,Wang L.Key-private proxy re-encryption under LWE[A].International Conference on Cryptology[C].Berlin:Springer,2013.1-18.
[5] Singh K,Rangan C P,et al.Cryptanalysis of unidirectional proxy re-encryption scheme[A].Information and Communication Technology-EurAsia Conference[C].Berlin:Springer,2014.564-575.
[6] Kirshanova,E.Proxy Re-encryption from lattices[A].International Workshop on Public Key Cryptography[C].Berlin:Springer,2014.77-94.
[7] Jiang M M,Hu Y P,et al.Lattice based multi-use unidirectional proxy re-encryption[J].Security & Communication Networks,2016,8(18):3796-3803.
[8] Fan X,Liu F H.Various Proxy Re-encryption Schemes from Lattices[EB/OL].https://eprint.iacr.org/2016/278.pdf,2017-05-11/2019-09-04.
[9] Polyakov Y,Rohloff K,et al.Fast proxy re-encryption for publish/subscribe systems[J].ACM Transactions on Privacy and Security,2017,20(4):1-31.
[10] Nu†ez D,Agudo I,Lopez J.NTRUReEncrypt:An efficient proxy re-encryption scheme based on NTRU[A].Proceedings of the 10th ACM Symposium on Information,Computer and Communications Security[C].Singapore:ACM,2015.179-189.
[11] Cohen A.What about Bob? The inadequacy of CPA security for proxy reencryption[A].IACR International Workshop on Public Key Cryptography[C].Berlin:Springer,2019.287-316.
[12] Fuchsbauer G.,Kamath C,et al.Adaptively secure proxy re-encryption[A].IACR International Workshop on Public Key Cryptography[C].Berlin:Springer,2019.317-346.
[13] 楼圣铭,曹珍富.基于身份的门限多代理者的代理重加密方案[J].黑龙江大学自然科学学报,2010,27(2):151-156.
[14] D Boneh,R Gennaro,et al.A Lattice-Based Universal Thresholdizer for Cryptographic Systems[EB/OL].https://eprint.iacr.org/2017/251.pdf,2017-03-19/2019-09-04.
[15] 李菊雁,马春光,赵乾.格上可重新拆分的门限多代理者的代理重加密方案[J].通信学报,2017,38(5):157-164. Ju-yan LI,Chun-guang MA,Qian ZHAO.Resplittable threshold multi-broker proxy re-encryption scheme from lattices[J].Journal on Communications,2017,38(5):157-164.(in Chinese)
[16] Lyubashevsky V,Peikert C,Regev O.On ideal lattices and learning with errors over rings[A].Annual International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin:Springer,2010.1-23.
[17] David N.UMBRAL:A Threshold Proxy Re-Encryption Scheme[EB/OL].https://github.com/nucypher/umbral-doc/blob/master/mbral-doc.pdf,2018-05-06/2019-09-04.
[18] Boneh D,Freeman D M.Homomorphic signatures for polynomial functions[A].Annual International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin:Springer,2011.149-168.
[19] Gorbunov S,Vaikuntanathan V,et al.Leveled fully homomorphic signatures from standard lattices[A].Proceedings of the forty-seventh annual ACM symposium on Theory of computing[C].USA:ACM,2015.469-477. |