메뉴 건너뛰기




Volumn 7672 LNCS, Issue , 2012, Pages 194-211

Proxy re-encryption in a privacy-preserving cloud computing DRM scheme

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTING CENTER; DIGITAL RIGHTS MANAGEMENT SYSTEM; DRM SYSTEM; PRIVACY INVASIONS; PRIVACY PRESERVING; PROFILE BUILDING; PROXY RE ENCRYPTIONS; SOFTWARE EXECUTION; SOFTWARE LICENSE;

EID: 84871374598     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-35362-8_16     Document Type: Conference Paper
Times cited : (21)

References (17)
  • 3
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1-30 (2006)
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 4
    • 84957718934 scopus 로고    scopus 로고
    • Divertible Protocols and Atomic Proxy Cryptography
    • Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
    • Blaze, M., Bleumer, G., Strauss, M.J.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.J.3
  • 5
    • 85032883059 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 10-18
    • El Gamal, T.1
  • 7
    • 33750274436 scopus 로고    scopus 로고
    • Privacy-Preserving Digital Rights Management
    • Jonker, W., Petković, M. (eds.) SDM 2004. Springer, Heidelberg
    • Conrado, C., Petković, M., Jonker, W.: Privacy-Preserving Digital Rights Management. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 83-99. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3178 , pp. 83-99
    • Conrado, C.1    Petković, M.2    Jonker, W.3
  • 10
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. of Computing 32(3), 586-615 (2003)
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 12
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28, 1030-1044 (1985)
    • (1985) Commun. ACM , vol.28 , pp. 1030-1044
    • Chaum, D.1
  • 14
    • 33847753565 scopus 로고    scopus 로고
    • Internet Engineering Task Force (IETF): Version 1.2 August RFC 5246
    • Internet Engineering Task Force (IETF): The Transport Layer Security (TLS) Protocol, Version 1.2 (August 2008); RFC 5246
    • (2008) The Transport Layer Security (TLS) Protocol


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.