[1]Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography[C] LNCS 1403: EUROCRYPT 1998. Berlin: Springer, 1998: 127144[2]Liang Xiaohui, Cao Zhenfu, Lin Huang, et al. Attribute based proxy reencryption with delegating capabilities[C] Proc of the 4th Int Symp on Information, Computer, and Communications Security. New York: ACM, 2009: 276286[3]Sandor V K A, Lin Yaping. Offline privacy preserving proxy reencryption in mobile cloud computing[J]. Pervasive and Mobile Computing, 2019, 59: 101081[4]Xue Yingjie, Xue Kaiping, Gai Na, et al. An attributebased controlled collaborative access control scheme for public cloud storage[J]. IEEE Trans on Information Forensics and Security, 2019,14(11): 29272942[5]Tang Qiang. Typebased proxy reencryption and its construction[C] Proc of the 9th Annual Int Conf on Cryptology. Berin: Springer, 2008: 130144[6]Fang Liming, Wang Jiandong, Ge Chunpeng, et al. Fuzzy conditional proxy reencryption[J]. Science China Information Sciences, 2013, 56(5): 113[7]Ge Chunpeng, Wang Jiandong, Fang Liming. Research on noninteractive construction based on fuzzy conditional proxy reencryption[J]. International Journal of Security and Its Applications, 2015, 9(12): 405418[8]蓝才会, 王彩芬. 一个新的基于秘密共享的条件代理重加密方案[J]. 计算机学报, 2013, 36(4): 895902[9]Liu Yepeng, Ren Yongjun, Ge Chunpeng, et al. A CCAsecure multiconditional proxy broadcast reencryption scheme for cloud storage system[J]. Journal of Information Security and Applications, 2019, 47: 125131[10]Fan Chuni, Chen Juncheng, Huang Shiyuan, et al. Provably secure timedrelease proxy conditional reencryption[J]. IEEE Systems Journal, 2017, 11(4): 22912302[11]Zeng Peng, Choo K. A new kind of conditional proxy reencryption for secure cloud storage[J]. IEEE Access, 2018, 6: 7001770024[12]Luo Song, Hu Jianbin, Chen Zhong. Ciphertext policy attributebased proxy reencryption[C] LNSC 6476: Proc of Int Conf on Information and Communications Security. Berlin: Springer, 2010: 401415[13]Zhang Kuan, Yang Kan, Liang Xiaohui, et al. Security and privacy for mobile healthcare networks: From a quality of protection perspective[J]. IEEE Wireless Communications, 2015, 22(4): 104112[14]Yang Yanjiang, Zhu Haiyan, Lu Haibing, et al. Cloud based data sharing with finegrained proxy reencryption[J]. Pervasive and Mobile Computing, 2016, 28: 122134[15]Xu Xiaolong, Zhang Qitong, Zhou Jinglan. NCMACPABE: Noncentered multiauthority proxy reencryption based on CPABE for cloud storage systems[J]. Journal of Central South University, 2017, 24(4): 807818[16]Deng Hua, Qin Zheng, Wu Qianhong, et al. Flexible attributebased proxy reencryption for efficient data sharing[J]. Information Sciences, 2020, 511: 94113[17]Weng Jian, Weng Jiasi, Liu Jianan, et al. Serveraided access control for cloud computing[J]. Chinese Journal of Network and Information Security, 2016, 2(10): 5876[18]Song Youjin. Threshold delegation scheme based on multiproxy reencryption[J]. International Journal of Security and Its Applications, 2016, 10(7): 35562[19]Li Juyan, Ma Chunguang, Zhao Qian. Resplittable threshold multibroker proxy reencryption scheme from lattices[J]. Journal on Communications, 2017, 38(5): 157164[20]Patil S M, Purushothama B R. Nontransitive and collusion resistant quorum controlled proxy reencryption scheme for resource constrained networks[J]. Journal of Information Security and Applications, 2020, 50: 112[21]李勇, 雷丽楠, 朱岩. 密文访问控制及其应用研究[J]. 信息安全研究, 2016, 2(8): 721728[22]Singh G, Serra L, Png W, et al. BrickNet: Sharing object behaviors on the net[C] Proc of IEEE VRAIS'95. Piscataway, NJ: IEEE, 1995: 1925[23]Wang Junwei. Java realization for ciphertextpolicy attributebased encryption[EBOL]. 2012 [20230618]. https:github.comjunweiwangcpabe[24]Huang Qinlong, Yang Yixian, Fu Jingyi. PRECISE: Identitybased private data sharing with conditional proxy reencryption in online social networks[J]. Future Generation Computer Systems, 2018 (86): 15231533 |