A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system

Journal of Information Security and Applications - Tập 47 - Trang 125-131 - 2019
Yepeng Liu1,2, Yongjun Ren1,2, Chunpeng Ge3, Jinyue Xia4, Qirun Wang5
1School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China
2Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET), Nanjing University of Information Science & Technology, Nanjing, China
3College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China
4International Business Machines Corporation (IBM), New York, USA
5School of engineering and technology, University of Hertfordshire, Hertford, UK

Tài liệu tham khảo

Zhang, 2018, A highly effective dpa attack method based on genetic algorithm, Comput Mater Contin, 56, 325 Wang, 2018, A PSO based energy efficient coverage control algorithm for wireless sensor networks, Comput Mater Contin, 56, 433 Ren, 2019, Secure data storage based on blockchain and coding in edge computing, Math Biosci Eng, 16, 1874, 10.3934/mbe.2019091 Ren, 2018, Incentive mechanism of data storage based on blockchain for wireless sensor networks, Mob Inf Syst, 10 Blaze, 1998, Divertible protocols and atomic proxy cryptography, 127 Mishra, 2018, CCA secure proxy re-encryption scheme for secure sharing of files through cloud storage, 1 Vijayakumar, 2018, E-health cloud security using timing enabled proxy re-encryption, Mob Netw Appl Ge, 2018, Codes, Cryptography: a CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system, Des Codes Cryptogr, 86, 2587, 10.1007/s10623-018-0462-9 Weng, 2010, CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles, Sci China Inf Sci, 53, 593, 10.1007/s11432-010-0047-3 Huang, 2018, PRECISE: identity-based private data sharing with conditional proxy re-encryption in online social networks, Future Gen Comput Syst, 86, 1523, 10.1016/j.future.2017.05.026 Ateniese, 2006, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Trans Inf Syst Secur, 9, 1, 10.1145/1127345.1127346 Weng, 2009, Conditional proxy re-encryption secure against chosen-ciphertext attack, 322 Chu, 2009, Conditional proxy broadcast re-encryption, 327 Bellafqira, 2017, Proxy re-encryption based on homomorphic encryption, 154 Tang, 2018, A proxy re-encryption with keyword search scheme in cloud computing, Comput Mater Contin, 56, 339 Mishra, 2018, CCA secure proxy re-encryption scheme for secure sharing of files through cloud storage, 1