2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2013
DOI: 10.1109/imis.2013.35
|View full text |Cite
|
Sign up to set email alerts
|

Certificate-Based Proxy Re-encryption for Public Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(24 citation statements)
references
References 15 publications
0
24
0
Order By: Relevance
“…This helps the data owner achieve fine-grained delegation control. A recent scheme in [40] combined the concept of the PRE with certificate-based encryption and proposed a certificate-based PRE that helped resist the adaptive chosen ciphertext attack. Another proposed PRE scheme in [34] is based on a keyword search, in which the ciphertext is re-encrypted if it contains a keyword match with some information related to the reencryption key.…”
Section: Related Workmentioning
confidence: 99%
“…This helps the data owner achieve fine-grained delegation control. A recent scheme in [40] combined the concept of the PRE with certificate-based encryption and proposed a certificate-based PRE that helped resist the adaptive chosen ciphertext attack. Another proposed PRE scheme in [34] is based on a keyword search, in which the ciphertext is re-encrypted if it contains a keyword match with some information related to the reencryption key.…”
Section: Related Workmentioning
confidence: 99%
“…And the users can access to the resource they need in their own favorite ways at anytime and anywhere. The researchers proposed the IBPRE [9], ABPRE [10], certificate based PRE [11], time based PRE(TPRE) [12], condition based PRE [13].…”
Section: Related Workmentioning
confidence: 99%
“…(11) : On input the signature and the public key , the algorithm outputs the result of the verification on signature of .…”
Section: A Basic Functionsmentioning
confidence: 99%
“…Hyla and Pejas proposed a certificate‐based group‐oriented encryption scheme with an effective secret‐sharing based on general access structure. Sur et al proposed a certificate‐based proxy re‐encryption for public cloud storage, which has the advantages of CBE while providing the functionalities of proxy re‐encryption. Fan et al proposed anonymous multi‐receiver CBE that is CPA secure.…”
Section: Introductionmentioning
confidence: 99%