A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
From MaRDI portal
Publication:1791671
DOI10.1007/S10623-018-0462-9zbMath1401.94155OpenAlexW2789097676WikidataQ122904055 ScholiaQ122904055MaRDI QIDQ1791671
Willy Susilo, Chunpeng Ge, Li-Ming Fang, Jian-Dong Wang, Yun Qing Shi
Publication date: 10 October 2018
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-018-0462-9
Related Items (7)
Lattice-based HRA-secure attribute-based proxy re-encryption in standard model ⋮ Efficient attribute-based proxy re-encryption with constant size ciphertexts ⋮ Attribute-based proxy re-encryption from standard lattices ⋮ HRA-secure attribute-based threshold proxy re-encryption from lattices ⋮ Flexible attribute-based proxy re-encryption for efficient data sharing ⋮ Development on security models for proxy re-encryption schemes ⋮ Revocable attribute-based proxy re-encryption
Cites Work
- Unnamed Item
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Identity-Based Proxy Re-encryption
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Fuzzy Identity-Based Encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Theory of Cryptography
This page was built for publication: A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system