메뉴 건너뛰기




Volumn 27, Issue 8, 2015, Pages 2004-2027

A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

Author keywords

bilinear map; chosen ciphertext security; ciphertext policy attribute based proxy re encryption; proxy re encryption

Indexed keywords

ACCESS CONTROL; DATA SHARING; DIGITAL STORAGE;

EID: 84928213141     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.3397     Document Type: Article
Times cited : (31)

References (37)
  • 1
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer R. (ed.)., Lecture Notes in Computer Science. Springer: Springer-Verlag Berlin, Heidelberg
    • Sahai A, Waters B,. Fuzzy identity-based encryption. In Eurocrypt, vol. 3494, Cramer R, (ed.)., Lecture Notes in Computer Science. Springer: Springer-Verlag Berlin, Heidelberg, 2005; 457-473.
    • (2005) Eurocrypt , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 3
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
    • Mambo M, Okamoto E,. Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Transactions 1997; E80-A (1): 54-63.
    • (1997) IEICE Transactions , vol.80 , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 7
    • 80051514746 scopus 로고    scopus 로고
    • Achieving fine-grained access control for secure data sharing on cloud servers
    • Wang G, Liu Q, Wu J,. Achieving fine-grained access control for secure data sharing on cloud servers. Concurrency and Computation: Practice and Experience 2011; 23 (12): 1443-1464.
    • (2011) Concurrency and Computation: Practice and Experience , vol.23 , Issue.12 , pp. 1443-1464
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 17
    • 79961066267 scopus 로고    scopus 로고
    • A timed-release proxy re-encryption scheme
    • Emura K, Miyaji A, Omote K,. A timed-release proxy re-encryption scheme. IEICE Transactions 2011; 94-A (8): 1682-1695.
    • (2011) IEICE Transactions , vol.94 , Issue.8 , pp. 1682-1695
    • Emura, K.1    Miyaji, A.2    Omote, K.3
  • 32
    • 78650185456 scopus 로고    scopus 로고
    • Hybrid proxy re-encryption scheme for attribute-based encryption
    • Bao F. Yung M. Lin D. Jing J. (eds)., Lecture Notes in Computer Science. Springer: Springer Berlin Heidelberg
    • Mizuno T, Doi H,. Hybrid proxy re-encryption scheme for attribute-based encryption. In Inscrypt, Vol. 6151, Bao F, Yung M, Lin D, Jing J, (eds)., Lecture Notes in Computer Science. Springer: Springer Berlin Heidelberg, 2009; 288-302.
    • (2009) Inscrypt , vol.6151 , pp. 288-302
    • Mizuno, T.1    Doi, H.2
  • 33
    • 84890070570 scopus 로고    scopus 로고
    • A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
    • Liang K, Fang L, Susilo W, Wong DS,. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security, 2013; 552-559. IEEE.
    • (2013) IEEE , pp. 552-559
    • Liang, K.1    Fang, L.2    Susilo, W.3    Wong, D.S.4
  • 35
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer R, Shoup V,. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 2004; 33 (1): 167-226.
    • (2004) SIAM J. Comput. , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 36
    • 84878478447 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Fujisaki E, Okamoto T,. Secure integration of asymmetric and symmetric encryption schemes. J. Cryptology 2013; 26 (1): 80-101.
    • (2013) J. Cryptology , vol.26 , Issue.1 , pp. 80-101
    • Fujisaki, E.1    Okamoto, T.2
  • 37
    • 84875985547 scopus 로고    scopus 로고
    • A CCA-secure identity-based conditional proxy re-encryption without random oracles
    • Kwon T. Lee M.K. Kwon D. (eds)., Lecture Notes in Computer Science. Springer: Springer Berlin Heidelberg
    • Liang K, Liu Z, Tan X, Wong DS, Tang C,. A CCA-secure identity-based conditional proxy re-encryption without random oracles. In Icisc, Vol. 7839, Kwon T, Lee MK, Kwon D, (eds)., Lecture Notes in Computer Science. Springer: Springer Berlin Heidelberg, 2012; 231-246.
    • (2012) Icisc , vol.7839 , pp. 231-246
    • Liang, K.1    Liu, Z.2    Tan, X.3    Wong, D.S.4    Tang, C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.