Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time ... View more
Ateniese, G., Fu, K., Green, M., Hohenberger, S.. Improved proxy re-encryption schemes with applications to secure distributed storage.
ACM Transactions on Information and System Security. 2006; 9 (1): 1-30
Choi, K. H., Jang, K. S., Shin, H. J.. Smart home environment for the protection of multimedia digital contents.
The Journal of IWIT. 2011; 11 (2): 189-196
Chu, C., Tzeng, W.. Identity-based proxy re-encryption without random oracles.
Information Security. 2007; 4779: 189-202
Kim, E. B., Kim, K. I., Kim, T. H., Cho, S. H.. A study of partial preview control method of ePUB-based eBook DRM.
The Journal of IWIT. 2012; 12 (1): 249-256
Ateniese, G., Hohenberger, S.. Proxy re-signatures: new definitions, algorithms, and applications. : 310-319