Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption

被引:0
|
作者
Liang, Kaitai [1 ]
Susilo, Willy [2 ]
Liu, Joseph K. [3 ]
Wong, Duncan S. [4 ]
机构
[1] Department of Computer Science, Aalto University, Espoo, Finland
[2] Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Wollongong,NSW,2522, Australia
[3] Faculty of Information Technology, Monash University, Melbourne, Australia
[4] Security and Data Sciences, ASTRI, Hong Kong
来源
Computer Journal | 2014年 / 58卷 / 10期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Journal article (JA)
引用
收藏
页码:2778 / 2792
相关论文
共 50 条
  • [41] Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 645 - 660
  • [42] Restricted CCA-secure Bidirectional Proxy Re-encryption Scheme
    Guo, Duntao
    Wang, Xu An
    Zhang, Minqing
    Yang, Xiaoyuan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 678 - 681
  • [43] Conditional Proxy Re-Encryption - A More Efficient Construction
    Vivek, S. Sree
    Selvi, S. Sharmila Deva
    Radhakishan, V.
    Rangan, C. Pandu
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 502 - +
  • [44] A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU
    Yang, Nan
    Tian, Youliang
    Zhou, Zhou
    Zhang, Qijia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [45] On the application of generic CCA-secure transformations to proxy re-encryption
    Nunez, David
    Agudo, Isaac
    Lopez, Javier
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1769 - 1785
  • [46] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [47] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [48] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [49] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [50] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +