메뉴 건너뛰기




Volumn , Issue , 2011, Pages 248-251

A general sharing model based on proxy re-encryption

Author keywords

content sharing; digital rights management; pay per sharing; proxy re encryption

Indexed keywords

CONTENT PROVIDERS; CONTENT SHARING; DIGITAL RIGHTS MANAGEMENT; DRM POLICY; MODEL-BASED OPC; PAY-PER-SHARING; PROXY RE ENCRYPTIONS; SHARING MECHANISM; WIN-WIN;

EID: 83455172497     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IIHMSP.2011.26     Document Type: Conference Paper
Times cited : (3)

References (13)
  • 1
    • 33745218758 scopus 로고    scopus 로고
    • Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage
    • February
    • G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage, ACM Trans. on Information and System Security,9(1):1-30, February 2006.
    • (2006) ACM Trans. on Information and System Security , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 2
    • 83455252951 scopus 로고    scopus 로고
    • Previously, in
    • Previously, in NDSS, pages 29-43, 2005.
    • (2005) NDSS , pp. 29-43
  • 3
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • M. Blaze, G. Bleumer and M. Strauss. Divertible protocols and atomic proxy cryptography,In Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144.Springer, Heidelberg,1998. (Pubitemid 128081481)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 5
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • ACM, New York
    • R. Canetti and S. Hohenberger. Chosen-ciphertext secure proxy re-encryption, In ACM CCS, pp. 185-194. ACM, New York, 2007.
    • (2007) ACM CCS , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 6
    • 57949106557 scopus 로고    scopus 로고
    • Proxy cryptography revisited
    • Y. Dodis and A. Ivan. Proxy cryptography revisited, In NDSS,2003.
    • (2003) NDSS
    • Dodis, Y.1    Ivan, A.2
  • 7
    • 38049073133 scopus 로고    scopus 로고
    • Securely Obfuscating Re-encryption
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • S. Hohenberger, G. N. Rothblum, A. Shelat and V. Vaikuntanathan. Securely Obfuscating Re-encryption, In Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp.233-252. Springer, Heidelberg, 2007.
    • (2007) LNCS , vol.4392 , pp. 233-252
    • Hohenberger, S.1    Rothblum, G.N.2    Shelat, A.3    Vaikuntanathan, V.4
  • 8
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Cramer, R. (ed.) PKC 2008. Springer,Heidelberg
    • B. Libert and D. Vergnaud. Unidirectional chosen-ciphertext secure proxy re-encryption, In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer,Heidelberg,2008.
    • (2008) LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 10
    • 35448976398 scopus 로고    scopus 로고
    • Digital rights management for home networks using ID-based public key system and group signature
    • P. Qingqi, M. Jianfeng,D. Jinxiu and F. Kefeng. Digital rights management for home networks using ID-based public key system and group signature, Chinese Journal of Electronics, vol 16, No. 4, pp 653-662, 2007.
    • (2007) Chinese Journal of Electronics , vol.16 , Issue.4 , pp. 653-662
    • Qingqi, P.1    Jianfeng, M.2    Jinxiu, D.3    Kefeng, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.