A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
- 1 November 2015
- journal article
- research article
- Published by Elsevier BV in Future Generation Computer Systems
- Vol. 52, 95-108
- https://doi.org/10.1016/j.future.2014.11.016
Abstract
No abstract availableKeywords
Funding Information
- Australian Research Council (LP120200052)
- RGC of the HKSAR, China (CityU 121512)
- University of Wollongong
- NSFC of China (61003232)
This publication has 9 references indexed in Scilit:
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertextsTheoretical Computer Science, 2014
- Securely Outsourcing Attribute-Based Encryption with CheckabilityIEEE Transactions on Parallel and Distributed Systems, 2013
- Attribute-based encryption schemes with constant-size ciphertextsTheoretical Computer Science, 2011
- A Timed-Release Proxy Re-Encryption SchemeIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
- Hidden attribute-based signatures without anonymity revocationInformation Sciences, 2010
- Enhancing Attribute-Based Encryption with Attribute HierarchyMobile Networks and Applications, 2010
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oraclesScience China Information Sciences, 2010
- Improved proxy re-encryption schemes with applications to secure distributed storageACM Transactions on Information and System Security, 2006
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext AttackSIAM Journal on Computing, 2003