메뉴 건너뛰기




Volumn 80, Issue 8, 2014, Pages 1549-1562

EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption

Author keywords

Anonymity; Cloud computing; Flexible sharing; Proxy re encryption

Indexed keywords

CLOUD COMPUTING; DATA SHARING;

EID: 84905094709     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2014.04.021     Document Type: Article
Times cited : (22)

References (22)
  • 1
    • 84905127036 scopus 로고    scopus 로고
    • https://certivox.com/
  • 2
    • 84905107967 scopus 로고    scopus 로고
    • http://crypto.stanford.edu/pbc/
  • 4
    • 67650135696 scopus 로고    scopus 로고
    • Key-private proxy re-encryption
    • Marc Fischlin, CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 Lect. Notes Comput. Sci. Springer
    • Giuseppe Ateniese, Karyn Benson, and Susan Hohenberger Key-private proxy re-encryption Marc Fischlin, Topics in Cryptology CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 Lect. Notes Comput. Sci. vol. 5473 2009 Springer 279 294
    • (2009) Topics in Cryptology , vol.5473 , pp. 279-294
    • Ateniese, G.1    Benson, K.2    Hohenberger, S.3
  • 5
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • The Internet Society
    • Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage NDSS 2005 The Internet Society
    • (2005) NDSS
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 6
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans. Inf. Syst. Secur. 9 1 2006 1 30
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 7
    • 0027764777 scopus 로고
    • A cryptographic file system for UNIX
    • Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, Victoria Ashby, ACM
    • Matt Blaze A cryptographic file system for UNIX Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, Victoria Ashby, ACM Conference on Computer and Communications Security 1993 ACM 9 16
    • (1993) ACM Conference on Computer and Communications Security , pp. 9-16
    • Blaze, M.1
  • 8
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Kaisa Nyberg, Lect. Notes Comput. Sci. Springer
    • Matt Blaze, Gerrit Bleumer, and Martin Strauss Divertible protocols and atomic proxy cryptography Kaisa Nyberg, EUROCRYPT Lect. Notes Comput. Sci. vol. 1403 1998 Springer 127 144
    • (1998) EUROCRYPT , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 9
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson, ACM
    • Ran Canetti, and Susan Hohenberger Chosen-ciphertext secure proxy re-encryption Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson, ACM Conference on Computer and Communications Security 2007 ACM 185 194
    • (2007) ACM Conference on Computer and Communications Security , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 10
    • 70350635910 scopus 로고    scopus 로고
    • Conditional proxy broadcast re-encryption
    • Colin Boyd, Juan Manuel González Nieto, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 Lect. Notes Comput. Sci. Springer
    • Cheng-Kang Chu, Jian Weng, Sherman S.M. Chow, Jianying Zhou, and Robert H. Deng Conditional proxy broadcast re-encryption Colin Boyd, Juan Manuel González Nieto, Information Security and Privacy 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 Lect. Notes Comput. Sci. vol. 5594 2009 Springer 327 342
    • (2009) Information Security and Privacy , vol.5594 , pp. 327-342
    • Chu, C.-K.1    Weng, J.2    Chow, S.S.M.3    Zhou, J.4    Deng, R.H.5
  • 11
    • 85033498470 scopus 로고    scopus 로고
    • SiriUS: Securing remote untrusted storage
    • The Internet Society
    • Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh SiriUS: securing remote untrusted storage NDSS 2003 The Internet Society
    • (2003) NDSS
    • Goh, E.-J.1    Shacham, H.2    Modadugu, N.3    Boneh, D.4
  • 12
    • 38049073133 scopus 로고    scopus 로고
    • Securely obfuscating re-encryption
    • Salil P. Vadhan, Lect. Notes Comput. Sci. Springer
    • Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, and Vinod Vaikuntanathan Securely obfuscating re-encryption Salil P. Vadhan, TCC Lect. Notes Comput. Sci. vol. 4392 2007 Springer 233 252
    • (2007) TCC , vol.4392 , pp. 233-252
    • Hohenberger, S.1    Rothblum, G.N.2    Shelat, A.3    Vaikuntanathan, V.4
  • 13
    • 85033460636 scopus 로고    scopus 로고
    • Plutus: Scalable secure file sharing on untrusted storage
    • USENIX
    • Mahesh Kallahalla, Erik Riedel, Ram Swaminathan, Qian Wang, and Kevin Fu Plutus: scalable secure file sharing on untrusted storage FAST 2003 USENIX
    • (2003) FAST
    • Kallahalla, M.1    Riedel, E.2    Swaminathan, R.3    Wang, Q.4    Fu, K.5
  • 14
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Ronald Cramer, Lect. Notes Comput. Sci. Springer
    • Benoît Libert, and Damien Vergnaud Unidirectional chosen-ciphertext secure proxy re-encryption Ronald Cramer, Public Key Cryptography Lect. Notes Comput. Sci. vol. 4939 2008 Springer 360 379
    • (2008) Public Key Cryptography , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 15
    • 77957655174 scopus 로고    scopus 로고
    • Cca proxy re-encryption without bilinear maps in the standard model
    • Phong Q. Nguyen, David Pointcheval, Lect. Notes Comput. Sci. Springer
    • Toshihide Matsuda, Ryo Nishimaki, and Keisuke Tanaka Cca proxy re-encryption without bilinear maps in the standard model Phong Q. Nguyen, David Pointcheval, Public Key Cryptography Lect. Notes Comput. Sci. vol. 6056 2010 Springer 261 278
    • (2010) Public Key Cryptography , vol.6056 , pp. 261-278
    • Matsuda, T.1    Nishimaki, R.2    Tanaka, K.3
  • 16
    • 67049100266 scopus 로고    scopus 로고
    • Cca-secure proxy re-encryption without pairings
    • Stanislaw Jarecki, Gene Tsudik, Lect. Notes Comput. Sci. Springer
    • Jun Shao, and Zhenfu Cao Cca-secure proxy re-encryption without pairings Stanislaw Jarecki, Gene Tsudik, Public Key Cryptography Lect. Notes Comput. Sci. vol. 5443 2009 Springer 357 376
    • (2009) Public Key Cryptography , vol.5443 , pp. 357-376
    • Shao, J.1    Cao, Z.2
  • 17
    • 78651327986 scopus 로고    scopus 로고
    • Cca-secure pre scheme without random oracles
    • Jun Shao, Zhenfu Cao, and Peng Liu Cca-secure pre scheme without random oracles J. Cryptol. 2010 2010 112
    • (2010) J. Cryptol. , vol.2010 , pp. 112
    • Shao, J.1    Cao, Z.2    Liu, P.3
  • 19
    • 84857361860 scopus 로고    scopus 로고
    • Achieving key privacy without losing CCA security in proxy re-encryption
    • Jun Shao, Peng Liu, and Yuan Zhou Achieving key privacy without losing CCA security in proxy re-encryption J. Syst. Softw. 85 3 2012 655 665
    • (2012) J. Syst. Softw. , vol.85 , Issue.3 , pp. 655-665
    • Shao, J.1    Liu, P.2    Zhou, Y.3
  • 21
    • 77952322019 scopus 로고    scopus 로고
    • Cca-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
    • Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, and Feng Bao Cca-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles Sci. China, Ser. F 53 3 2010 593 606
    • (2010) Sci. China, Ser. F , vol.53 , Issue.3 , pp. 593-606
    • Weng, J.1    Chen, M.-R.2    Yang, Y.3    Deng, R.H.4    Chen, K.5    Bao, F.6
  • 22
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • IEEE Press
    • Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou Achieving secure, scalable, and fine-grained data access control in cloud computing INFOCOM 2010 IEEE Press 534 542
    • (2010) INFOCOM , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.