2019
DOI: 10.1016/j.jisa.2019.05.015
|View full text |Cite
|
Sign up to set email alerts
|

Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…In our future work, we will explore methods of obtaining more flexible and revocable tracing keys. Additionally, we will consider whether the traceability system can be incorporated into other lattice-based schemes, such as revocable IBE [70][71][72], identity-based proxy re-encryption [73][74][75], and IBE schemes with equality test [76,77].…”
Section: Discussionmentioning
confidence: 99%
“…In our future work, we will explore methods of obtaining more flexible and revocable tracing keys. Additionally, we will consider whether the traceability system can be incorporated into other lattice-based schemes, such as revocable IBE [70][71][72], identity-based proxy re-encryption [73][74][75], and IBE schemes with equality test [76,77].…”
Section: Discussionmentioning
confidence: 99%
“…According to the striking development of quantum computers, we need PREs which can resist quantum attacks. Since the Shore algorithm [110] solves the number-theoretic problems in polynomial time, Hou et al recently proposed not only quantumresistant but also identity-based PRE over lattice sets [111]. Dutta et al designed another quantum-resistant PRE which is collusion-resistant, non-transitive, and transparent [112].…”
Section: Proxy Re-encryption Schemementioning
confidence: 99%
“…6. Quantum resistance: Though post-quantum cryptography was out of the scope of this paper, the bi-directional PRE in [111] is a quantum-resistant primitive among the discussed advanced primitives. Caramés in [20], Lohachab et al in [16], and Caramés & Tiago in [158] elaborated quantum-resistant encryption algorithms in IoT systems.…”
Section: B-connecting the Dots Tablementioning
confidence: 99%
“…Because images have inherent characteristics, like high redundancy and a significant correlation between adjacent pixels, it's simple to obtain the value of a pixel's neighbors. As a result, images require an effective way for achieving invulnerability [4]. Image encryption methods majorly use three approaches: (1) pixel permutation: the pixels are scrambled by the algorithm [5,6], (2) pixel substitution: the pixel value is modified by the encryption technique, and (3) visual transformation.…”
Section: Introductionmentioning
confidence: 99%