Proxy re-encryption (PRE) can be classified as single-hop PRE and multi-use PRE according to the times which the ciphertext is transformed. Finding a unidirectional, multiuse, and chosen ciphertext attack (CCA) secure PRE is presented as an open problem by Canetti et al. Wang claimed to resolve this problem by proposing the first multi-use CCAsecure unidirectional PRE scheme. But Zhang et al. have shown their proposal is not CCAsecure by giving concrete attacks. In this paper, we propose an improvement for Wang-MultiUse-PRE to resist Zhang’s attack. But we also found that different with single-hop PRE, multi-use PRE without randomize encrypt key in its re-encryption algorithm could be vulnerable to attack. According to this principle we find a new type attack to multi-use CCAsecure PRE named proxy bypass attack. Then we give concrete attacks on Wang-Multi-UsePRE scheme. This attack is also effective for other multi-use scheme.