Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption

被引:0
|
作者
Liang, Kaitai [1 ]
Susilo, Willy [2 ]
Liu, Joseph K. [3 ]
Wong, Duncan S. [4 ]
机构
[1] Department of Computer Science, Aalto University, Espoo, Finland
[2] Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Wollongong,NSW,2522, Australia
[3] Faculty of Information Technology, Monash University, Melbourne, Australia
[4] Security and Data Sciences, ASTRI, Hong Kong
来源
Computer Journal | 2014年 / 58卷 / 10期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Journal article (JA)
引用
收藏
页码:2778 / 2792
相关论文
共 50 条
  • [31] Identity-based proxy re-encryption without random oracles
    Chu, Cheng-Kang
    Tzeng, Wen-Guey
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 189 - +
  • [32] Identity-based multi-condition proxy re-encryption
    Wang, Pingshu
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1047 - 1052
  • [33] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Jun-Zuo Lai
    Wen-Tao Zhu
    Robert H. Deng
    Sheng-Li Liu
    Wei-Dong Kou
    Journal of Computer Science and Technology, 2010, 25 : 793 - 806
  • [34] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    赖俊祚
    朱文涛
    邓慧杰
    刘胜利
    寇卫东
    Journal of Computer Science & Technology, 2010, 25 (04) : 793 - 806
  • [35] CCA-Secure Proxy Re-encryption without Pairings
    Shao, Jun
    Cao, Zhenfu
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 357 - 376
  • [36] Identity-Based Proxy Re-encryption Based on SM9
    Liu, Hang
    Ming, Yang
    Wang, Chenhao
    Zhao, Yi
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 320 - 339
  • [37] A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Kim, Hyung-Jin
    Ra, In-Ho
    IEEE ACCESS, 2021, 9 : 42801 - 42816
  • [38] Provably Secure Certificate-based Conditional Proxy Re-encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    Yao, Wei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (04) : 813 - 830
  • [39] Identity-based re-encryption scheme with lightweight re-encryption key generation
    Liu, Liang
    Ye, Jun
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01): : 41 - 57
  • [40] Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 645 - 660