A new RSA-based proxy re-encryption scheme

被引:0
|
作者
Wang, Liangliang [1 ]
Chen, Kefei [2 ]
Long, Yu [1 ]
Mao, Xianping [1 ]
机构
[1] Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
[2] School of Science, Hangzhou Normal University, Hangzhou, China
来源
关键词
Compendex;
D O I
10.12733/jcis13034
中图分类号
学科分类号
摘要
Security of data
引用
下载
收藏
页码:567 / 575
相关论文
共 50 条
  • [1] RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication
    Patil, Shravani Mahesh
    Purushothama, B. R.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019, 2019, 11319 : 349 - 363
  • [2] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [3] A new conditional proxy re-encryption scheme based on secret sharing
    Lan, C.-H. (lanzhourm@163.com), 1600, Science Press (36):
  • [4] Proxy Re-encryption Scheme based on New Multivariate Quadratic Assumptions
    Zhu, Shuaishuai
    Yang, Xiaoyuan
    JOURNAL OF COMPUTERS, 2013, 8 (12) : 3238 - 3242
  • [5] On the Insecurity of an Identity Based Proxy Re-encryption Scheme
    Wang, Xu An
    Yang, Xiaoyuan
    FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 277 - 281
  • [6] New Identity Based Proxy Re-Encryption Scheme from Lattices
    Wu, Ligiang
    Yang, Xiltoymin
    Zhang, Minqing
    Liu, Longfei
    CHINA COMMUNICATIONS, 2019, 16 (10) : 174 - 190
  • [7] New Identity Based Proxy Re-Encryption Scheme from Lattices
    Liqiang Wu
    Xiaoyuan Yang
    Minqing Zhang
    Longfei Liu
    China Communications, 2019, 16 (10) : 174 - 190
  • [8] Group-Based Proxy Re-encryption Scheme
    Ma, Chunbo
    Ao, Jun
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1025 - 1034
  • [9] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [10] A proxy re-encryption scheme based on elliptic curve group
    Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):