Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme

Article English OPEN
Li, Huixian; Pang, Liaojun;
(2016)

Ciphertext-Policy Attribute-Based Proxy Reencryption (CP-ABPRE) has found many practical applications in the real world, because it extends the traditional Proxy Reencryption (PRE) and allows a semitrusted proxy to transform a ciphertext under an access policy to the on... View more
  • References (46)
    46 references, page 1 of 5

    Feng, D. G., Chen, C.. Research on attribute-based cryptography. Journal of Cryptologic Research. 2014; 1 (1): 1-12

    Goyal, V., Pandey, O., Sahai, A., Waters, B.. Attribute-based encryption for fine-grained access control of encrypted data. : 89-98

    Li, Q. Y., Zhang, F. L.. A fully secure attribute based broadcast encryption scheme. International Journal of Network Security. 2015; 17 (3): 263-271

    Liang, K. T., Fang, L. M., Wong, D. S., Susilo, W.. A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency and Computation: Practice and Experience. 2014; 27 (8): 2004-2027

    Chang, C.-C., Sun, C.-Y., Cheng, T.-F.. A dependable storage service system in cloud environment. Security and Communication Networks. 2015; 8 (4): 574-588

    Liang, X., Cao, Z., Lin, H., Shao, J.. Attribute based proxy re-encryption with delegating capabilities. : 276-286

    Luo, S., Hu, J., Chen, Z., Soriano, M., Qing, S., López, J.. Ciphertext policy attribute-based proxy re-encryption. Information and Communications Security. 2010; 6476: 401-415

    Seo, H., Kim, H.. Attribute-based proxy re-encryption with a constant number of pairing operations. International Journal of Information and Communication Engineering. 2012; 10 (1): 53-60

    Li, K. Y.. Matrix access structure policy used in attribute-based proxy re-encryption.

    Chung, P.-S., Liu, C.-W., Hwang, M.-S.. A study of attribute-based proxy re-encryption scheme in cloud environments. International Journal of Network Security. 2014; 16 (1): 1-13

  • Similar Research Results (4)
  • Metrics
Share - Bookmark