Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data Sharing
暂无分享,去创建一个
Xu An Wang | Fatos Xhafa | Jinting Nie | Zhiheng Zheng | Xu An Wang | F. Xhafa | Zhiheng Zheng | Jinting Nie
[1] Fabrice Kordon,et al. An approach for developing an interoperability mechanism between cloud providers , 2014, Int. J. Space Based Situated Comput..
[2] Joseph K. Liu,et al. A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing , 2014, IEEE Transactions on Information Forensics and Security.
[3] Joseph K. Liu,et al. An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing , 2014, ESORICS.
[4] Eiji Okamoto,et al. Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities , 2012 .
[5] Qiong Huang,et al. A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release , 2013, ISPEC.
[6] Ying Wang,et al. Degradation and encryption for outsourced PNG images in cloud storage , 2016, Int. J. Grid Util. Comput..
[7] Yevgeniy Dodis,et al. Proxy cryptography revisted , 2003 .
[8] Xu An Wang,et al. PRE+: Dual of Proxy Re-encryption and Its Application , 2013, IACR Cryptol. ePrint Arch..
[9] Dong Hoon Lee,et al. New Constructions of Revocable Identity-Based Encryption From Multilinear Maps , 2015, IEEE Transactions on Information Forensics and Security.
[10] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[11] Elena Apostol,et al. A solution for the management of multimedia sessions in hybrid clouds , 2014, Int. J. Space Based Situated Comput..
[12] Chun-Ying Huang,et al. Secure Multicast Using Proxy Encryption , 2005, ICICS.
[13] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[14] Haixia Xu,et al. A secure delegation scheme of large polynomial computation in multi-party cloud , 2015, Int. J. Grid Util. Comput..
[15] Xiaoyuan Yang,et al. Protecting data in cloud environment with attribute-based encryption , 2015, Int. J. Grid Util. Comput..
[16] Yevgeniy Dodis,et al. Proxy Cryptography Revisited , 2003, NDSS.
[17] Yun Ling,et al. Anonymous proxy re-encryption , 2012, Secur. Commun. Networks.