“…Generally speaking, we can split the research area into two parts-proxy re-encryption part and proxy resignature part.In proxy re-encryption area, besides the pioneering work [2], [6], researchers have done some good work on achieving CCA2 proxy re-encryption such as [11], [22],some good work on achieving proxy reencryption in identity-based settings [14] or between identity-based setting and PKI setting [9], [15],some good work on achieving proxy re-encryption without random oracle [16], [17],some good work on other aspects of proxy re-encryption [12], [18]- [21], [23], [24].In proxy re-signature area,some good work also has been done [7], [13], [26], [27].…”