“…Proxy re-encryption (PRE) has been widely applied as a resolvent method to many problems in past years, including cloud computing [10], [28], [30], access control in file storage [11], internet of thing [27], [29], [34], [36], email forwarding [12], law enforcement [13], and Personal Health Record (PHR) [14].…”