|
[1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re- encryption Schemes with Applications to Secure Distributed Storage,” In: Proc. of the Network and Distributed System Security Symposium - NDSS '05, pp. 29-43, 2005.
[2] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re- encryption Schemes with Applications to Secure Distributed Storage,” ACM Transactions on Information and System Security - TISSEC '06, Vol. 9, No.1, pp. 1-30, 2006.
[3] M. Blaze, G. Bleumer, and M. Strauss, “Divertible Protocols and Atomic Proxy Cryptography,” Advances in Cryptology - EUROCRYPT'98, LNCS 1403, pp. 127-144, 1998.
[4] M. Green and G. Ateniese, “Identity-based Proxy Re-encryption,” In: Proc. of the 5th International Conference on Applied Cryptography and Network Security - ACNS '07, LNCS 4521, pp. 288-306, 2007.
[5] A. Ivan and Y. Dodis, “Proxy Cryptography Revisited,” In: Proc. of the Net- work and Distributed System Security Symposium - NDSS '03, 2003.
[6] R. Canetti and S. Hohenberger, “Chosen-ciphertext Secure Proxy Re- Encryption,” In: Proc. of the 14th ACM conference on Computer and Com- munications Security - CCS '07, pp. 185-194, 2007.
[7] D. Boneh and X. Boyen, “E_cient Selective-ID Secure Identity-based Encryp- tion without Random Oracles, ” Advances in Cryptology - EUROCRYPT'04, LNCS 3027, pp. 223-238, 2004.
[8] D. Boneh and M. Franklin, “Identity-based Encryption from the Weil Pairing,” Advances in Cryptology - CRYPTO'01, LNCS 2139, pp. 213-229, 2001. 34 BIBLIOGRAPHY 35
[9] T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Advances in Cryptology - CRYPTO'84, LNCS 196, pp. 10-18, 1985.
[10] R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
[11] N. Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, Vol. 48, No. 177, pp. 203-209, 1987.
[12] V. S. Miller, “Use of Elliptic Curve in Cryptography,” Advances in Cryptology - CRYPTO'85, LNCS 218, pp. 417-426, 1986.
[13] T. Matsuo, “Proxy Re-encryption Systems for Identity-based Encryption,” In: Proc. of Pairing-based Cryptography - Pairing '07, LNCS 4575, pp. 247-267, 2007.
[14] T. Mizuno and H. Doi, “Secure and E_cient IBE-PKE Proxy Re-encryption,” IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E94-A, No. 1, pp. 36-44, 2011.
[15] H. Wang, Z. Cao, and L. Wang, “Multi-use and Unidirectional Identity-based Proxy Re-encryption Schemes,” Information Sciences, Vol. 180, No. 20, pp. 4042-4059, 2010.
[16] Y. Cai and X. Liu, “A CCA-secure Multi-use Identity-based Proxy Re- encryption Scheme, ” In: Proc. of IEEE Symposium on Computer Applications and Communications - SCAC'14, pp. 51-56, 2014.
[17] B. Libert and D. Vergnaud, “Unidirectional Chosen-ciphertext Secure Proxy Re-encryption,” In: Proc. of Public Key Cryptography - PKC'08, LNCS 4939, pp. 360-379, 2008.
[18] J. Shao and Z. Cao, “Cca-secure Proxy Re-encryption without Pairings,” In: Proc. of Public Key Cryptography - PKC'09, LNCS 5443, pp. 357-376, 2009.
[19] J. Shao, P. Liu, Z. Cao, and G. Wei, “Multi-use Unidirectional Proxy Re- encryption,” In: Proc. of IEEE International Conference on Communications - ICC '11, pp. 1-5, 2011.
[20] J. Shao and Z. Cao, “Multi-use Unidirectional Identity-based Proxy Re- encryption from Hierarchical Identity-based Encryption,” Information Sci- ences, Vol. 206, pp. 83-95, 2012. BIBLIOGRAPHY 36
[21] R. H. Deng, J. Weng, S. Liu, and K. Chen, “Chosen-ciphertext Secure Proxy Re-encryption without Pairings,” In: Proc. of 7th International Conference on Cryptology and Network Security - CANS'08, LNCS 5339, pp. 1-17, 2008.
[22] J. Weng, R. H. Deng, X. Ding, C. K. Chu, and J. Lai, “Conditional Proxy Re-encryption Secure against Chosen-ciphertext Attack,” In: Proc. of the 4th International Symposium on Information, Computer, and Communications Se- curity - ASIACCS '09, pp. 322-332, 2009.
[23] S. S. Vivek, S. S. D. Selvi, V. Radhakishan, and C. Pandu Rangan, “Con- ditional Proxy Re-Encryption - A More E_cient Construction,” In: Proc. of International Conference on Network Security and Applications - CNSA'11, CCIS, Vol. 196, pp. 502-512, 2011.
[24] J. Li, X. Zhao, Y. Zhang, and W. Yao, “Provably Secure Certi_cate-based Con- ditional Proxy Re-encryption,” Journal of Information Science and Engineering - JISE '16, Vol. 32, pp. 813-830, 2016.
[25] Dropbox, https://www.dropbox.com/
[26] Google drive, https://drive.google.com/
[27] B. Waters, “E_cient Identity-based Encryption without Random Oracles,” Ad- vances in Cryptology - EUROCRYPT'05, LNCS 3494, pp. 114-127, 2005.
[28] D. Dolev, C. Dwork, and M.Naor, “Non-malleable Cryptography,” SIAM Jour- nal of Computing, vol. 30, pp. 391-437, 2000.
[29] M. Bellare, A. Desai, D. Pointcheval, P. Rogaway, “Relations Among No- tions of Security for Public-key Encryption Scheme,” Advances in Cryptology - CRYPTO'98, LNCS 1462, pp. 26-45, 1998.
[30] M. Bellare and P. Rogaway, “Random Oracles Are Practical: A Paradigm for Designing E_cient Protocols,” In: Proc. of the 1st ACM Conference on Computer and Communications Security - CCS '93, pp. 62-73, 1993.
[31] R. Canetti, H. Krawczyk, and J. B. Nielsen, “Relaxing Chosen-Ciphertext Secu- rity,” Advances in Cryptology - CRYPTO'03, LNCS 2729, pp. 565-582, 2003.
|