[1] |
JIANG Jianchun, WEN Weiping.The Information Security Problems of Cloud Computing Environment[J]. Netinfo Security, 2010,10(2):61-63.
|
|
蒋建春, 文伟平. "云"计算环境的信息安全问题[J]. 信息网络安全, 2010,10(2):61-63.
|
[2] |
FANG Jing,WU Hao,BAI Songlin.Review of Cloud Computing Security[J], Telecommunications Science, 2011, 27(4):37-42.
|
|
房晶, 吴昊, 白松林. 云计算安全研究综述[J]. 电信科学, 2011, 27(4):37-42.
|
[3] |
BO Mingxia.CHEN Jun.WANGWeiqing.Study of the System Architecture of Cloud Security[J]. Netinfo Security, 2011,11(8):79-81.
|
|
薄明霞, 陈军, 王渭清. 云计算安全体系架构研究[J]. 信息网络安全, 2011,11(8):79-81.
|
[4] |
BLAZE M, BLEUMER G, STRAUSS M.Divertible Protocols and Atomic Proxy Cryptography[J]. Lecture Notes in Computer Science, 1998(1403):127-144.
|
[5] |
GREEN M, ATENIESE G.Identity-based Proxy Re-encryption[C]//ACM. The 5th International Conference on Applied Cryptography and Network Security, June 5 - 8, 2007, Zhuhai, China. New York:ACM,2007: 288-306.
|
[6] |
AL-RIYAMI S, PATERSON K G.Certificateless Public Key Cryptography[J]. Asiacrypt, 2003, 2894(2):452-473.
|
[7] |
WU Xiaoxin, XU Lei, ZHANG Xinwen.Poster: a Certificateless Proxy Re-encryption Scheme for Cloud-based Data Sharing[C]//ACM. The 18th ACM Conference on Computer and Communications Security, October 17 - 21, 2011, Chicago, Illinois, USA. New York: ACM, 2011:869-872.
|
[8] |
XU Lei, WU Xiaoxin, ZHANG Xinwen.CL-PRE: a Certificateless Proxy Re-encryption Scheme for Secure Data Sharing with Public Cloud[C]// ACM. The 7th ACM Symposium on Information, Computer and Communications Security, May 2 - 4, 2012, Seoul, Korea. NewYork: ACM, 2012:87-88.
|
[9] |
ZHAO Lili.Application of Proxy Re-encryption in Cloud Computing[J]. Information Security and Communications Privacy, 2012(11):135-137.
|
|
赵丽丽. 代理重加密技术在云计算中的应用[J].信息安全与通信保密, 2012(11):135-137.
|
[10] |
WANG Liangliang, CHEN Kefei, MAO Xianping, et al.Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing[J]. Journal of Shanghai Jiaotong University(Science), 2014, 19(4):398-405.
|
[11] |
QIN Zhiguang, WU Shikun, XIONG Hu.Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing[M]//Springer. Big Data Computing and Communications. Cham :Springer, Cham, 2015:205-216.
|
[12] |
ZHU Jun, CHEN Linlin, ZHU Xian, et al.Certificateless Proxy Re-encryption for Cloud Computing Security[J]. Computer Engineering, 2017, 43(8):8-14.
|
|
朱俊, 陈琳琳, 朱娴,等. 面向云计算安全的无证书代理重加密方案[J]. 计算机工程, 2017, 43(8):8-14.
|
[13] |
XAGAWA K. Cryptography with Lattices[EB/OL]. .
|
[14] |
JIANG Mingming, HU Yupu, WANG Baocang et al. Lattice-based Unidirectional Proxy Re-encryption[J]. Security and Commutation Networks, 2016, 18(8):3796-3803.
|
[15] |
ALWEN J, PEIKER C.Generating Shorter Bases for Hard Random Lattices[J]. Theory of Computing Systems,2011,48(3): 535-553.
|
[16] |
GENTRY C, PEIKERT C, VAIKUNTANATHAN V. How to Use a Short Basis:Trapdoors for Hard Lattices and New Cryptographic Constructions[EB/OL]. ,2018-5-10.
|
[17] |
BONEH D, FREEMAN D M.Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-based Signatures[C]//ACM. The 14th International Conference on Practice and Theory in Public Key Cryptography, March 6 - 9, 2011, Taormina, Italy. New York: ACM, 2011:1-16.
|
[18] |
BOYEN X.Lattice Mixing and Vanishing Trapdoors: a Framework for Fully Secure Short Signatures and More[C]//ACM. The 13th International Conference on Practice and Theory in Public Key Cryptography, May 26 - 28, 2010, Paris, France. New York: ACM, 2010: 499-517.
|