A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system
Tài liệu tham khảo
Zhang, 2018, A highly effective dpa attack method based on genetic algorithm, Comput Mater Contin, 56, 325
Wang, 2018, A PSO based energy efficient coverage control algorithm for wireless sensor networks, Comput Mater Contin, 56, 433
Ren, 2019, Secure data storage based on blockchain and coding in edge computing, Math Biosci Eng, 16, 1874, 10.3934/mbe.2019091
Ren, 2018, Incentive mechanism of data storage based on blockchain for wireless sensor networks, Mob Inf Syst, 10
Blaze, 1998, Divertible protocols and atomic proxy cryptography, 127
Mishra, 2018, CCA secure proxy re-encryption scheme for secure sharing of files through cloud storage, 1
Vijayakumar, 2018, E-health cloud security using timing enabled proxy re-encryption, Mob Netw Appl
Ge, 2018, Codes, Cryptography: a CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system, Des Codes Cryptogr, 86, 2587, 10.1007/s10623-018-0462-9
Weng, 2010, CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles, Sci China Inf Sci, 53, 593, 10.1007/s11432-010-0047-3
Huang, 2018, PRECISE: identity-based private data sharing with conditional proxy re-encryption in online social networks, Future Gen Comput Syst, 86, 1523, 10.1016/j.future.2017.05.026
Ateniese, 2006, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Trans Inf Syst Secur, 9, 1, 10.1145/1127345.1127346
Weng, 2009, Conditional proxy re-encryption secure against chosen-ciphertext attack, 322
Chu, 2009, Conditional proxy broadcast re-encryption, 327
Bellafqira, 2017, Proxy re-encryption based on homomorphic encryption, 154
Tang, 2018, A proxy re-encryption with keyword search scheme in cloud computing, Comput Mater Contin, 56, 339
Mishra, 2018, CCA secure proxy re-encryption scheme for secure sharing of files through cloud storage, 1