References
- Matt Blaze, Gerrit Bleumer, Martin Strauss, "Divertible protocols and atomic proxy cryptography," in Proc. of EUROCRYPT 1998, pp. 127-144, May 31- June 4, 1998.
- Taher El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, 1985. https://doi.org/10.1109/TIT.1985.1057074
- Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," in Proc. of NDSS 2005, February 3-4, 2005.
- Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," ACM Transaction on Information and System Security, vol. 9, no. 1, pp. 1-30, 2006. https://doi.org/10.1145/1127345.1127346
- Ran Canetti, Susan Hohenberger, "Chosen-ciphertext secure proxy re-encryption," in Proc. of ACM Conference on Computer & Communication Security 2007, pp. 185-194, October 29- November 2, 2007.
- Giuseppe Ateniese, Karyn Benson and Susan Hohenberger, "Key-Private Proxy Re-encryption," in Proc. of CT-RSA 2009, pp. 279-294, April 20-24, 2009.
- Benoit Libert, Damien Vergnaud, "Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption," IEEE Transactions on Information Theory, vol. 57, no. 3, pp. 1786-1802, 2008. https://doi.org/10.1109/TIT.2011.2104470
- Peter Gutmann, "PKI: It's Not Dead, Just Resting," IEEE Computer, vol. 35, no. 8, pp. 41-49, 2002.
- Adi Shamir, "Identity-Based Cryptosystems and Signature Schemes," in Proc. of CRYPTO 1984, pp. 47-53, August 19-22, 1984.
- Matthew Green, Giuseppe Ateniese, "Identity-Based Proxy Re-encryption," in Proc. of ACNS 2007, pp. 288-306, June 5-8, 2007.
- S. S. Al-Riyami, K. G. Paterson, "Certificateless Public Key Cryptography," in Proc. of ASIACRYPT 2003, pp. 452-473, November 30 to December 4, 2003.
- Dae Hyun Yum, Pil Joong Lee, "Generic Construction of Certificateless Encryption," in Proc. of ICCSA(1) 2004, pp. 802-811, May 14-17, 2004.
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo, "Certificateless Public Key Encryption Without Pairing," in Proc. of ACM Trans. Inf. Syst. Secur., pp. 134-148, September 20-23, 2005.
- Benoit Libert, Jean-Jacques Quisquate, "On Constructing Certificateless Cryptosystems from Identity Based Encryption," in Proc. of PKC 2006, pp. 474-490, April 24-26, 2006.
- Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, "Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles)," in Proc. of Pairing 2007, 4575, pp. 60-82, July 2-4, 2007.
- Yinxia Sun, Futai Zhang, Joonsang Baek, "Strongly Secure Certificateless Public Key Encryption Without Pairing," in Proc. of CANS 2007, pp. 194-208, December 8-10, 2007.
- Alexander W. Dent, Benoit Libert, Kenneth G. Paterson, "Certificateless Encryption Schemes Strongly Secure in the Standard Model," in Proc. of PKC 2008, pp. 344-359, March 9-12, 2008.
- Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li, "An Efficient Certificateless Encryption Scheme in the Standard Model," in Proc. of NSS 2009, pp. 302-309, October 19-21, 2009.
- Ario Fiore, Rosario Gennaro, Nigel P. Smart, "Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement," in Proc. of Pairing 2010, pp. 167-186, December 13-15, 2010.
- S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan, "CCA Secure Certificateless Encryption Schemes based on RSA," in Proc. of SECRYPT 2011, pp. 208-217, July 18-21, 2011.
- Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee, "Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption," in Proc. of CMS 2010, pp. 214-232, May 31 - June 2, 2010.
- Xiaoxin Wu, Lei Xu, Xinwen Zhang, "Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing," in Proc. of CCS 2011, pp. 869-872, October 17-21, 2011.
- Lei Xu, Xiaoxin Wu, Xinwen Zhang, "CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud," in Proc. of ASIACCS 2012, pp. 87-88, May 2-4, 2012.
- Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo, "An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing," in Proc. of ESORICS 2014, pp. 257-272, September 7-11, 2014.
- Peng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, Deqing Zou, "Generally Hybrid Proxy Re-Encryption: {A} Secure Data Sharing among Cryptographic Clouds," in Proc. of AsiaCCS 2016, pp. 913-918, May 30-June 3, 2016.
- Yang Yang, Maode Ma, "Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds," IEEE transaction on Information Forensics and Security, vol. 11, no. 4, pp. 746-759, 2016. https://doi.org/10.1109/TIFS.2015.2509912
- Ran Canetti, Susan Hohenberger, "Chosen-ciphertext secure proxy re-encryption," in Proc. of ACM Conference on Computer & Communication Security 2007, pp. 185-194, October 29- November 2, 2007.
- Jee Hea An, Yevgeniy Dodis, Tal Rabin, "On the Security of Joint Signature and Encryption," in Proc. of EUROCRYPT'02, pp. 83-107, April 28- May 2, 2002.
- Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway, "Relations Among Notions of Security for Public-Key Encryption Schemes," in Proc. of CRYPTO 1998, pp. 26-45, August 23-27, 1998.
- Jean-Sebastien Coron, "On the Exact Security of Full Domain Hash," in Proc. of CRYPTO 2000, pp. 229-235, August 20-24, 2000.