Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption

被引:0
|
作者
Liang, Kaitai [1 ]
Susilo, Willy [2 ]
Liu, Joseph K. [3 ]
Wong, Duncan S. [4 ]
机构
[1] Department of Computer Science, Aalto University, Espoo, Finland
[2] Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Wollongong,NSW,2522, Australia
[3] Faculty of Information Technology, Monash University, Melbourne, Australia
[4] Security and Data Sciences, ASTRI, Hong Kong
来源
Computer Journal | 2014年 / 58卷 / 10期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Journal article (JA)
引用
收藏
页码:2778 / 2792
相关论文
共 50 条
  • [1] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    COMPUTER JOURNAL, 2015, 58 (10): : 2778 - 2792
  • [2] Identity-Based Conditional Proxy Re-Encryption
    Zhou Dehua
    Chen Kefei
    Liu Shengli
    Zheng Dong
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 61 - 66
  • [3] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [4] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267
  • [5] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +
  • [6] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [7] A CCA-secure Multi-use Identity-based Proxy Re-encryption Scheme
    Cai, Yi
    Liu, Xudong
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND COMMUNICATIONS (SCAC), 2014, : 51 - 56
  • [8] Identity-based conditional proxy re-encryption with fine grain policy
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Fang, Liming
    COMPUTER STANDARDS & INTERFACES, 2017, 52 : 1 - 9
  • [9] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27
  • [10] Identity-based Conditional Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Lee, YoungSil
    Lee, HoonJae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 349 - 353