Time-and-ID-Based Proxy Reencryption Scheme

Other literature type, Article English OPEN
Mtonga, Kambombo; Paul, Anand; Rho, Seungmin;

Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time ... View more
  • References (32)
    32 references, page 1 of 4

    Ateniese, G., Fu, K., Green, M., Hohenberger, S.. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security. 2006; 9 (1): 1-30

    Choi, K. H., Jang, K. S., Shin, H. J.. Smart home environment for the protection of multimedia digital contents. The Journal of IWIT. 2011; 11 (2): 189-196

    Chu, C., Tzeng, W.. Identity-based proxy re-encryption without random oracles. Information Security. 2007; 4779: 189-202

    Kim, E. B., Kim, K. I., Kim, T. H., Cho, S. H.. A study of partial preview control method of ePUB-based eBook DRM. The Journal of IWIT. 2012; 12 (1): 249-256

    Ateniese, G., Hohenberger, S.. Proxy re-signatures: new definitions, algorithms, and applications. : 310-319

    Libert, B., Vergnaud, D.. Multi-use unidirectional proxy re-signatures. : 511-520

    Blaze, M., Bleumer, G., Strauss, M.. Divertible protocols and atomic proxy cryptography. Advances in cryptology—EUROCRYPT. 1998; 1403: 127-144

    ElGamal, T.. A public key cryptosystem and a signature scheme based on discrete logarithms. Advances in Cryptology. 1985; 196: 10-18

    Shao, J., Cao, Z., Liu, P.. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Security and Communication Networks. 2011; 4 (2): 122-135

    Weng, J., Deng, R. H., Ding, X., Chu, C.-K., Lai, J.. Conditional proxy re-encryption secure against chosen-ciphertext attack. : 322-332

  • Similar Research Results (4)
  • Metrics
Share - Bookmark