A new RSA-based proxy re-encryption scheme

被引:0
|
作者
Wang, Liangliang [1 ]
Chen, Kefei [2 ]
Long, Yu [1 ]
Mao, Xianping [1 ]
机构
[1] Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
[2] School of Science, Hangzhou Normal University, Hangzhou, China
来源
关键词
Compendex;
D O I
10.12733/jcis13034
中图分类号
学科分类号
摘要
Security of data
引用
下载
收藏
页码:567 / 575
相关论文
共 50 条
  • [21] Performance Analysis of the Symmetric Proxy Re-encryption Scheme
    Meiliasari, Rizky Putri
    Syalim, Amril
    Yazid, Setiadi
    2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 91 - 96
  • [22] A Timed-Release Proxy Re-Encryption Scheme
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (08) : 1682 - 1695
  • [23] Improved Proxy Re-encryption Scheme with Equality Test
    Yang, Chih-Chen
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    Tseng, Yi-Fan
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 37 - 44
  • [24] Proxy Re-encryption Scheme from IBE to CBE
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 99 - 102
  • [25] A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain
    Eltayieb, Nabeil
    Sun, Liang
    Wang, Ke
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 293 - 307
  • [26] Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme
    Li Z.
    Zhang L.
    Zhao H.
    Wei Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (01): : 44 - 49+83
  • [27] Circular Transitivity of a Bidirectional Proxy Re-encryption Scheme
    Hong, Xiaojing
    Wang, Bin
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2639 - +
  • [28] Collusion resistant identity based proxy re-encryption scheme on lattices
    Key Laboratory of Cryptography and Information Security under the Chinese Armed Police Force, Engineering University of the Armed Police Force, Xi'an
    710086, China
    不详
    710071, China
    Huazhong Ligong Daxue Xuebao, 1671, 3 (110-115):
  • [29] A cloud data deduplication scheme based on certificateless proxy re-encryption
    Zheng, Xiaoyu
    Zhou, Yuyang
    Ye, Yalan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 102
  • [30] Attribute-based proxy re-encryption scheme with multiple features
    Feng C.
    Luo W.
    Qin Z.
    Yuan D.
    Zou L.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 177 - 189