An authenticated re-encryption scheme for secure file transfer in named data networks

[1]  A. Serhrouchni,et al.  Named-Data security scheme for Named Data Networking , 2012, 2012 Third International Conference on The Network of the Future (NOF).

[2]  Zhenfu Cao,et al.  Multi-Use Unidirectional Proxy Re-Encryption , 2011, 2011 IEEE International Conference on Communications (ICC).

[3]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[4]  Xiaotie Deng,et al.  TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.

[5]  Xiaotie Deng,et al.  TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[6]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[7]  Matthew Green,et al.  Identity-Based Proxy Re-encryption , 2007, ACNS.

[8]  Xu An Wang,et al.  A New Identity Based Proxy Re-Encryption Scheme , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.

[9]  Scott Shenker,et al.  A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.

[10]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[11]  Xu An Wang,et al.  CCA-secure Identity Based Proxy Re-encryption Based on a Variant of BB1 IBE , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[12]  Tao Jiang,et al.  An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2013, IEEE Transactions on Computers.

[13]  Joonsang Baek,et al.  Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.

[14]  Diana K. Smetters,et al.  VoCCN: voice-over content-centric networks , 2009, ReArch '09.

[15]  Lixia Zhang,et al.  Data naming in Vehicle-to-Vehicle communications , 2012, 2012 Proceedings IEEE INFOCOM Workshops.

[16]  Benoît Libert,et al.  Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.

[17]  Alexander Afanasyev,et al.  Rapid traffic information dissemination using named data , 2012, NoM '12.

[18]  Wen-Guey Tzeng,et al.  Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.

[19]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[20]  Sihem Mesnager,et al.  A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems , 2016, IACR Cryptol. ePrint Arch..

[21]  Xiaoming Hu,et al.  ID-Based Proxy Re-Encryption Schemes Without Random Oracle , 2009, 2009 International Conference on Computational Intelligence and Security.

[22]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[23]  Sihem Mesnager,et al.  A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs , 2016, SPACE.

[24]  Yun Ling,et al.  Identity-Based Conditional Proxy Re-Encryption , 2011, 2011 IEEE International Conference on Communications (ICC).

[25]  Xu An Wang,et al.  Identity Based Proxy Re-encryption Based on a Variant of BB1 Identity Based Encryption , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.