Attribute-based proxy re-encryption (ABPRE) allows a semi-trusted proxy to transform an encryption under an access-policy into an encryption under a new access policy, without revealing any information about the underlying message. Such a primitive facilitates fine-grained secure sharing of encrypted...
Attribute-based proxy re-encryption (AB-PRE) is an application of proxy cryptography in ABE [4,15,19,26]. AB-PRE schemes allow the data owner to delegate the capability of re-encryption to the semi-trusted proxy. In this way, the proxy is capable of running the re-encryption operation,...
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing-英文资料 热度: Ciphertext-Policy Attribute-Based Encryption An Expressive, E… 热度: Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext ...
Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext 热度: Ciphertext-Policy Attribute-Based Encryption An Expressive, E… 热度: A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing-英文资料 热度: 相关...
2. A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds [J] . Kaitai Liang, Liming Fang, Duncan S. Wong, Concurrency and computation: practice and experience . 2015,第8期 机译:基于密文策略属性的代理重加密方案,用于公共云中的数据共享 3. SecClou...
Cloud based data sharing with fine-grained proxy re-encryption Pervasive Mob. Comput. (2016)View more references Cited by (102) Security and trust issues in Fog computing: A survey 2018, Future Generation Computer Systems Citation Excerpt : Smart meters can encrypt and send the data to a Fog...
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Qin Liu,Guojun Wang,Jie Wu.Qin Liu,Guojun Wang.Qin Liu.Time-based proxy re-encryption scheme for secure data sharing in a cloud environment,2014... Q Liu,G Wang,J Wu - 《Information Sciences》 被引量:...
Hierarchical ABE also allows for proxy re-encryption, but it forces a fixed structure for the access policies, limiting the flexibility of the access control system. In [18], Sedaghat et al. presented a decryption outsourceable Ciphertext-Policy Attribute-Based Signcryption (CP-ABSC) construction...
Further, by incorporating proxy re-encryption and lazy re-encryption techniques, we are able to delegate heavy system update workload during user revocation to the resourceful semi-trusted cloud server. We formalize the security definition and prove the proposed ABKS-UR scheme selectively secure ...
(e.g., prescribed drug) is leaked, the user privacy will be damaged. In this paper, we propose an attribute-based Proxy Re-encryption scheme based on data split. Security of data storage and the matching between doctors and patients are tackled by CP-ABE and Proxy Re-encryption. To ...