Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption

被引:0
|
作者
Liang, Kaitai [1 ]
Susilo, Willy [2 ]
Liu, Joseph K. [3 ]
Wong, Duncan S. [4 ]
机构
[1] Department of Computer Science, Aalto University, Espoo, Finland
[2] Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Wollongong,NSW,2522, Australia
[3] Faculty of Information Technology, Monash University, Melbourne, Australia
[4] Security and Data Sciences, ASTRI, Hong Kong
来源
Computer Journal | 2014年 / 58卷 / 10期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Journal article (JA)
引用
收藏
页码:2778 / 2792
相关论文
共 50 条
  • [21] Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption
    Huang, Qinlong
    He, Yue
    Yue, Wei
    Yang, Yixian
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [22] CCA secure and efficient proxy re-encryption scheme without bilinear pairing
    Prasad, Shilpee
    Purushothama, B. R.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [23] CCA secure and efficient proxy re-encryption scheme without bilinear pairing
    Prasad, Shilpee
    Purushothama, B.R.
    Journal of Information Security and Applications, 2021, 58
  • [24] Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
    Xu, Peng
    Jiao, Tengfei
    Wu, Qianhong
    Wang, Wei
    Jin, Hai
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (01) : 66 - 79
  • [25] A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme
    Ge, Chunpeng
    Wang, Jiandong
    Fang, Liming
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 347 - 360
  • [26] Efficient and Secure Certificateless Proxy Re-Encryption
    Liu, Ya
    Wang, Hongbing
    Wang, Chunlu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
  • [27] Key-Private Identity-Based Proxy Re-Encryption
    Ge, Chunpeng
    Xia, Jinyue
    Fang, Liming
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 633 - 647
  • [28] An identity-based proxy re-encryption for data deduplication in cloud
    Kan, Ge
    Jin, Chunhua
    Zhu, Huihui
    Xu, Yongliang
    Liu, Nian
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 121
  • [29] Inter-domain Identity-Based Proxy Re-encryption
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 332 - 347
  • [30] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Lai, Jun-Zuo
    Zhu, Wen-Tao
    Deng, Robert H.
    Liu, Sheng-Li
    Kou, Wei-Dong
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (04) : 793 - 806