메뉴 건너뛰기




Volumn 9, Issue 10, 2014, Pages 1667-1680

A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

Author keywords

chosen ciphertext security; Functional encryption; functional proxy re encryption

Indexed keywords

CHOSEN CIPHERTEXT SECURITY; FUNCTIONAL ENCRYPTIONS; PROXY RE ENCRYPTIONS; PROXY RE-ENCRYPTION SCHEMES; PUBLIC CLOUDS;

EID: 84907468655     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2346023     Document Type: Article
Times cited : (102)

References (34)
  • 1
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Feb.
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1-30, Feb. 2006.
    • (2006) ACM Trans. Inf. Syst. Security , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 3
    • 38049024484 scopus 로고    scopus 로고
    • Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles
    • Berlin, Germany: Springer-Verlag
    • M. Bellare and S. Shoup, "Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 4450. Berlin, Germany: Springer-Verlag, 2007, pp. 201-216.
    • (2007) Public Key Cryptography (Lecture Notes in Computer Science) , vol.4450 , pp. 201-216
    • Bellare, M.1    Shoup, S.2
  • 5
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Berlin, Germany: Springer-Verlag
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography, " in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1998, pp. 127-144.
    • (1998) Advances in Cryptology , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 7
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption, " in Proc. 14th ACM CCS, 2007, pp. 185-194.
    • (2007) Proc. 14th ACM CCS , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 8
    • 45749116552 scopus 로고    scopus 로고
    • Provably secure ciphertext policy ABE
    • L. Cheung and C. Newport, "Provably secure ciphertext policy ABE, " in Proc. 14th ACM CCS, 2007, pp. 456-465.
    • (2007) Proc. 14th ACM CCS , pp. 456-465
    • Cheung, L.1    Newport, C.2
  • 9
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Jan.
    • R. Cramer and V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, " SIAM J. Comput., vol. 33, no. 1, pp. 167-226, Jan. 2004.
    • (2004) SIAM J. Comput. , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 11
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. 13th ACM CCS, 2006, pp. 89-98.
    • (2006) Proc. 13th ACM CCS , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 12
    • 38049061546 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption
    • Jun.
    • M. Green and G. Ateniese, "Identity-based proxy re-encryption, " in Proc. 5th Int. Conf. ACNS, vol. 4512. Jun. 2007, pp. 288-306.
    • (2007) Proc. 5th Int. Conf. ACNS , vol.4512 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 13
    • 84863280137 scopus 로고    scopus 로고
    • Generic construction of chosen ciphertext secure proxy re-encryption
    • Berlin, Germany: Springer-Verlag
    • G. Hanaoka et al., "Generic construction of chosen ciphertext secure proxy re-encryption, " in Topics in Cryptology (Lecture Notes in Computer Science), vol. 7178. Berlin, Germany: Springer-Verlag, 2012, pp. 349-364.
    • (2012) Topics in Cryptology (Lecture Notes in Computer Science) , vol.7178 , pp. 349-364
    • Hanaoka, G.1
  • 14
    • 84874289731 scopus 로고    scopus 로고
    • Proxy re-encryption in a stronger security model extended from CT-RSA2012
    • Berlin, Germany: Springer-Verlag
    • T. Isshiki, M. H. Nguyen, and K. Tanaka, "Proxy re-encryption in a stronger security model extended from CT-RSA2012, " in Topics in Cryptology (Lecture Notes in Computer Science), vol. 7779. Berlin, Germany: Springer-Verlag, pp. 277-292.
    • Topics in Cryptology (Lecture Notes in Computer Science) , vol.7779 , pp. 277-292
    • Isshiki, T.1    Nguyen, M.H.2    Tanaka, K.3
  • 15
    • 57949106557 scopus 로고    scopus 로고
    • Proxy cryptography revisited
    • Feb.
    • A. A. Ivan and Y. Dodis, "Proxy cryptography revisited, " in Proc. NDSS, Feb. 2003.
    • (2003) Proc. NDSS
    • Ivan, A.A.1    Dodis, Y.2
  • 16
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • Berlin, Germany: Springer-Verlag
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6110. Berlin, Germany: Springer-Verlag, 2010, pp. 62-91.
    • (2010) Advances in Cryptology (Lecture Notes in Computer Science) , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 17
    • 84865479255 scopus 로고    scopus 로고
    • New proof methods for attribute-based encryption: Achieving full security through selective techniques
    • Berlin, Germany: Springer-Verlag
    • A. Lewko and B. Waters, "New proof methods for attribute-based encryption: Achieving full security through selective techniques, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 7417. Berlin, Germany: Springer-Verlag, 2012, pp. 180-198.
    • (2012) Advances in Cryptology (Lecture Notes in Computer Science) , vol.7417 , pp. 180-198
    • Lewko, A.1    Waters, B.2
  • 18
    • 84901660031 scopus 로고    scopus 로고
    • An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
    • May
    • K. Liang, M. H. Au, W. Susilo, D. S. Wong, G. Yang, and Y. Yu, "An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing, " in Proc. 10th Int. Conf. ISPEC, vol. 8434. May 2014, pp. 448-461.
    • (2014) Proc. 10th Int. Conf. ISPEC , vol.8434 , pp. 448-461
    • Liang, K.1    Au, M.H.2    Susilo, W.3    Wong, D.S.4    Yang, G.5    Yu, Y.6
  • 19
    • 84907463015 scopus 로고    scopus 로고
    • Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
    • Jun.
    • K. Liang, C.-K. Chu, X. Tan, D. S. Wong, C. Tang, and J. Zhou, "Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, " Theoretical Comput. Sci., vol. 539, pp. 87-105, Jun. 2014.
    • (2014) Theoretical Comput. Sci. , vol.539 , pp. 87-105
    • Liang, K.1    Chu, C.-K.2    Tan, X.3    Wong, D.S.4    Tang, C.5    Zhou, J.6
  • 20
    • 84890070570 scopus 로고    scopus 로고
    • A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
    • Sep.
    • K. Liang, L. Fang, W. Susilo, and D. S. Wong, "A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security, " in Proc. 5th Int. Conf. INCoS, Sep. 2013, pp. 552-559.
    • (2013) Proc. 5th Int. Conf. INCoS , pp. 552-559
    • Liang, K.1    Fang, L.2    Susilo, W.3    Wong, D.S.4
  • 23
    • 77952362084 scopus 로고    scopus 로고
    • Attribute based proxy re-encryption with delegating capabilities
    • X. Liang, Z. Cao, H. Lin, and J. Shao, "Attribute based proxy re-encryption with delegating capabilities, " in Proc. 4th Int. Symp. ASIACCS, 2009, pp. 276-286.
    • (2009) Proc. 4th Int. Symp. ASIACCS , pp. 276-286
    • Liang, X.1    Cao, Z.2    Lin, H.3    Shao, J.4
  • 24
  • 25
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Berlin, Germany: Springer-Verlag
    • B. Libert and D. Vergnaud, "Unidirectional chosen-ciphertext secure proxy re-encryption, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 4939. Berlin, Germany: Springer-Verlag, 2008, pp. 360-379.
    • (2008) Public Key Cryptography (Lecture Notes in Computer Science) , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 26
    • 78650865160 scopus 로고    scopus 로고
    • Ciphertext policy attribute-based proxy re-encryption
    • M. Soriano, S. Qing, and J. López, Eds. Berlin, Germany: Springer-Verlag
    • S. Luo, J. Hu, and Z. Chen, "Ciphertext policy attribute-based proxy re-encryption, " in Information and Communications Security (Lecture Notes in Computer Science), vol. 6476, M. Soriano, S. Qing, and J. López, Eds. Berlin, Germany: Springer-Verlag, 2010, pp. 401-415.
    • (2010) Information and Communications Security (Lecture Notes in Computer Science) , vol.6476 , pp. 401-415
    • Luo, S.1    Hu, J.2    Chen, Z.3
  • 28
    • 78650185456 scopus 로고    scopus 로고
    • Hybrid proxy re-encryption scheme for attribute-based encryption
    • Berlin, Germany: Springer-Verlag
    • T. Mizuno and H. Doi, "Hybrid proxy re-encryption scheme for attribute-based encryption, " in Information Security and Cryptology (Lecture Notes in Computer Science), vol. 6151. Berlin, Germany: Springer-Verlag, 2011, pp. 288-302.
    • (2011) Information Security and Cryptology (Lecture Notes in Computer Science) , vol.6151 , pp. 288-302
    • Mizuno, T.1    Doi, H.2
  • 29
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures, " in Proc. 14th ACM CCS, 2007, pp. 195-203.
    • (2007) Proc. 14th ACM CCS , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 31
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Berlin, Germany: Springer-Verlag
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 6571. Berlin, Germany: Springer-Verlag, 2011, pp. 53-70.
    • (2011) Public Key Cryptography (Lecture Notes in Computer Science) , vol.6571 , pp. 53-70
    • Waters, B.1
  • 32
    • 84865452842 scopus 로고    scopus 로고
    • Functional encryption for regular languages
    • Berlin, Germany: Springer-Verlag
    • B. Waters, "Functional encryption for regular languages, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 7417. Berlin, Germany: Springer-Verlag, 2012, pp. 218-235.
    • (2012) Advances in Cryptology (Lecture Notes in Computer Science) , vol.7417 , pp. 218-235
    • Waters, B.1
  • 33
    • 77952320634 scopus 로고    scopus 로고
    • Conditional proxy re-encryption secure against chosen-ciphertext attack
    • J. Weng, R. H. Deng, X. Ding, C.-K. Chu, and J. Lai, "Conditional proxy re-encryption secure against chosen-ciphertext attack, " in Proc. 4th Int. Symp. ASIACCS, 2009, pp. 322-332.
    • (2009) Proc. 4th Int. Symp. ASIACCS , pp. 322-332
    • Weng, J.1    Deng, R.H.2    Ding, X.3    Chu, C.-K.4    Lai, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.