A new RSA-based proxy re-encryption scheme

被引:0
|
作者
Wang, Liangliang [1 ]
Chen, Kefei [2 ]
Long, Yu [1 ]
Mao, Xianping [1 ]
机构
[1] Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
[2] School of Science, Hangzhou Normal University, Hangzhou, China
来源
关键词
Compendex;
D O I
10.12733/jcis13034
中图分类号
学科分类号
摘要
Security of data
引用
下载
收藏
页码:567 / 575
相关论文
共 50 条
  • [31] Proxy Re-Encryption Scheme for Decentralized Storage Networks
    Kan, Jia
    Zhang, Jie
    Liu, Dawei
    Huang, Xin
    APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [32] Efficient proxy re-encryption with keyword search scheme
    Guo, Lifeng
    Lu, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
  • [33] Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme
    Tang, Yongli
    Jin, Minglu
    Meng, Hui
    Yang, Li
    Zheng, Chengfu
    ENTROPY, 2023, 25 (05)
  • [34] A Scheme for Electronic Evidence Sharing Based on Blockchain and Proxy Re-encryption
    Miao, Zhikun
    Ye, Chengxu
    Yang, Ping
    Liu, Rui
    Liu, Bing
    Chen, Ying
    2021 4TH INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, ICBTA 2021, 2021, : 11 - 16
  • [35] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
    Devigne, Julien
    Guerrini, Eleonora
    Laguillaumie, Fabien
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
  • [36] Blockchain Data Controlled Sharing Scheme Based on Proxy Re-Encryption
    Guo Q.
    Tian Y.-L.
    Wan L.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (02): : 477 - 488
  • [37] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689
  • [38] Towards a Secure Certificateless Proxy Re-Encryption Scheme
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    Chen, Cheng
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 330 - 346
  • [39] A Multi-users Searchable Encryption Scheme with Proxy Re-encryption
    Zhang Ya-ling
    Liu Kai
    Wang Shang-ping
    Sun Qin-dong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 563 - 567
  • [40] A New RSA-Based Signature Scheme
    Schaege, Sven
    Schwenk, Joerg
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 1 - 15