參考文獻 |
[1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-
encryption Schemes with Applications to Secure Distributed Storage,” In: Proc.
of the Network and Distributed System Security Symposium - NDSS ′05, pp.
29-43, 2005.
[2] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-
encryption Schemes with Applications to Secure Distributed Storage,” ACM
Transactions on Information and System Security - TISSEC ′06, Vol. 9, No.1,
pp. 1-30, 2006.
[3] M. Blaze, G. Bleumer, and M. Strauss, “Divertible Protocols and Atomic Proxy
Cryptography,” Advances in Cryptology - EUROCRYPT′98, LNCS 1403, pp.
127-144, 1998.
[4] M. Green and G. Ateniese, “Identity-based Proxy Re-encryption,” In: Proc. of
the 5th International Conference on Applied Cryptography and Network Security
- ACNS ′07, LNCS 4521, pp. 288-306, 2007.
[5] A. Ivan and Y. Dodis, “Proxy Cryptography Revisited,” In: Proc. of the Net-
work and Distributed System Security Symposium - NDSS ′03, 2003.
[6] R. Canetti and S. Hohenberger, “Chosen-ciphertext Secure Proxy Re-
Encryption,” In: Proc. of the 14th ACM conference on Computer and Com-
munications Security - CCS ′07, pp. 185-194, 2007.
[7] D. Boneh and X. Boyen, “E_cient Selective-ID Secure Identity-based Encryp-
tion without Random Oracles, ” Advances in Cryptology - EUROCRYPT′04,
LNCS 3027, pp. 223-238, 2004.
[8] D. Boneh and M. Franklin, “Identity-based Encryption from the Weil Pairing,”
Advances in Cryptology - CRYPTO′01, LNCS 2139, pp. 213-229, 2001.
34
BIBLIOGRAPHY 35
[9] T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on
Discrete Logarithms,” Advances in Cryptology - CRYPTO′84, LNCS 196, pp.
10-18, 1985.
[10] R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital
Signatures and Public-key Cryptosystems,” Communications of the ACM, Vol.
21, No. 2, pp. 120-126, 1978.
[11] N. Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, Vol.
48, No. 177, pp. 203-209, 1987.
[12] V. S. Miller, “Use of Elliptic Curve in Cryptography,” Advances in Cryptology
- CRYPTO′85, LNCS 218, pp. 417-426, 1986.
[13] T. Matsuo, “Proxy Re-encryption Systems for Identity-based Encryption,” In:
Proc. of Pairing-based Cryptography - Pairing ′07, LNCS 4575, pp. 247-267,
2007.
[14] T. Mizuno and H. Doi, “Secure and E_cient IBE-PKE Proxy Re-encryption,”
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E94-A, No. 1, pp. 36-44, 2011.
[15] H. Wang, Z. Cao, and L. Wang, “Multi-use and Unidirectional Identity-based
Proxy Re-encryption Schemes,” Information Sciences, Vol. 180, No. 20, pp.
4042-4059, 2010.
[16] Y. Cai and X. Liu, “A CCA-secure Multi-use Identity-based Proxy Re-
encryption Scheme, ” In: Proc. of IEEE Symposium on Computer Applications
and Communications - SCAC′14, pp. 51-56, 2014.
[17] B. Libert and D. Vergnaud, “Unidirectional Chosen-ciphertext Secure Proxy
Re-encryption,” In: Proc. of Public Key Cryptography - PKC′08, LNCS 4939,
pp. 360-379, 2008.
[18] J. Shao and Z. Cao, “Cca-secure Proxy Re-encryption without Pairings,” In:
Proc. of Public Key Cryptography - PKC′09, LNCS 5443, pp. 357-376, 2009.
[19] J. Shao, P. Liu, Z. Cao, and G. Wei, “Multi-use Unidirectional Proxy Re-
encryption,” In: Proc. of IEEE International Conference on Communications
- ICC ′11, pp. 1-5, 2011.
[20] J. Shao and Z. Cao, “Multi-use Unidirectional Identity-based Proxy Re-
encryption from Hierarchical Identity-based Encryption,” Information Sci-
ences, Vol. 206, pp. 83-95, 2012.
BIBLIOGRAPHY 36
[21] R. H. Deng, J. Weng, S. Liu, and K. Chen, “Chosen-ciphertext Secure Proxy
Re-encryption without Pairings,” In: Proc. of 7th International Conference on
Cryptology and Network Security - CANS′08, LNCS 5339, pp. 1-17, 2008.
[22] J. Weng, R. H. Deng, X. Ding, C. K. Chu, and J. Lai, “Conditional Proxy
Re-encryption Secure against Chosen-ciphertext Attack,” In: Proc. of the 4th
International Symposium on Information, Computer, and Communications Se-
curity - ASIACCS ′09, pp. 322-332, 2009.
[23] S. S. Vivek, S. S. D. Selvi, V. Radhakishan, and C. Pandu Rangan, “Con-
ditional Proxy Re-Encryption - A More E_cient Construction,” In: Proc. of
International Conference on Network Security and Applications - CNSA′11,
CCIS, Vol. 196, pp. 502-512, 2011.
[24] J. Li, X. Zhao, Y. Zhang, and W. Yao, “Provably Secure Certi_cate-based Con-
ditional Proxy Re-encryption,” Journal of Information Science and Engineering
- JISE ′16, Vol. 32, pp. 813-830, 2016.
[25] Dropbox, https://www.dropbox.com/
[26] Google drive, https://drive.google.com/
[27] B. Waters, “E_cient Identity-based Encryption without Random Oracles,” Ad-
vances in Cryptology - EUROCRYPT′05, LNCS 3494, pp. 114-127, 2005.
[28] D. Dolev, C. Dwork, and M.Naor, “Non-malleable Cryptography,” SIAM Jour-
nal of Computing, vol. 30, pp. 391-437, 2000.
[29] M. Bellare, A. Desai, D. Pointcheval, P. Rogaway, “Relations Among No-
tions of Security for Public-key Encryption Scheme,” Advances in Cryptology -
CRYPTO′98, LNCS 1462, pp. 26-45, 1998.
[30] M. Bellare and P. Rogaway, “Random Oracles Are Practical: A Paradigm
for Designing E_cient Protocols,” In: Proc. of the 1st ACM Conference on
Computer and Communications Security - CCS ′93, pp. 62-73, 1993.
[31] R. Canetti, H. Krawczyk, and J. B. Nielsen, “Relaxing Chosen-Ciphertext Secu-
rity,” Advances in Cryptology - CRYPTO′03, LNCS 2729, pp. 565-582, 2003. |