Identity-based proxy re-encryption version 2: Making mobile access easy in cloud
- 1 September 2016
- journal article
- Published by Elsevier BV in Future Generation Computer Systems
- Vol. 62, 128-139
- https://doi.org/10.1016/j.future.2015.09.027
Abstract
No abstract availableKeywords
Funding Information
- Fundamental Research Funds for the Central Universities
- Research funds (14XNLF02)
- Innovation Fund of China Aerospace Science and Technology Corporation
- Ministry of Education, Shandong University
- Open Research Fund of Beijing Key Laboratory of Trusted Computing
This publication has 6 references indexed in Scilit:
- A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharingFuture Generation Computer Systems, 2015
- A secure and scalable storage system for aggregate data in IoTFuture Generation Computer Systems, 2015
- Identity-based data storage in cloud computingFuture Generation Computer Systems, 2013
- Tracing Malicious Proxies in Proxy Re-encryptionLecture Notes in Computer Science, 2008
- Improved proxy re-encryption schemes with applications to secure distributed storageACM Transactions on Information and System Security, 2006
- On Quorum Controlled Asymmetric Proxy Re-encryptionLecture Notes in Computer Science, 1999