[1] Matt B,Gerrit B,Martin S. Divertible protocols and atomic proxy cryptography//Advances in Cryptology-EUROCRYPT1998,International Conference on the Theory and Application of Cryptographic Techniques. Espoo: LNCS1403, 1998: 127-144. [2] Gelareh T, Alvaro A C, Virgil D G. Towards a secure and interoperable DRM architecture//Proceedings of the 6th ACM workshop on Digital Rights Management. New York: ACM Press, 2006: 69-78. [3] Do W N, Jung S L, Jeong H K. Interlock system for DRM interoperability of streaming contents//Proceedings of IEEE International Symposium on Consumer Electronics 2007 (ISCE 2007). Irving,TX: IEEE Press, 2007: 1-4. [4] Sangho L, Heejin P, Jong K. A secure and mutual-profitable DRM interoperability scheme//Computers and Communications (ISCC). Riccione: , 2010: 75-80. [5] Qiu Qin,Tang Zhi,Yu Yinyan.A decentralized authorization scheme for DRM in P2P file-sharing systems//Consumer Communications and Networking Conference(CCNC). Las Vegas:IEEE Press,2011:136-140. [6] Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption [J]. IEEE Transactions on Information Theory, 2011, 57(3):1786-1802. [7] Shao Jun, Liu Peng, Zhou Yuan. Achieving key privacy without losing CCA security in proxy re-encryption [J]. Journal of Systems and Software,2012,85(3):655-665. [8] Chen Minrong, Zhang Xi. Comments on Shao-Caos unidirectional proxy re-encryption scheme from PKC 2009 [J].China Communications,2011,8(2):66-74. [9] 邵俊.代理重加密的研究.上海: 上海交通大学, 2008. [10] Weng Jian, Chen Minrong, Yang Yanjiang. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles [J]. Science China-Information Sciences, 2010, 53(3):593-606. |