Attribute-based proxy re-encryption scheme with multiple features
A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy a...
Saved in:
Main Authors: | Chaosheng FENG, Wangping LUO, Zhiguang QIN, Ding YUAN, Liping ZOU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2019-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019127/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
by: Lei SUN, et al.
Published: (2019-05-01) -
Verifiable outsourced attribute-based encryption with access update
by: Suqing LIN
Published: (2019-02-01) -
Outsourced attribute-based encryption with policy update
by: Su-qing LIN
Published: (2016-05-01) -
Efficient chosen-ciphertext secure proxy re-encryption scheme
by: Wei-wei ZHANG, et al.
Published: (2013-07-01) -
Research on cloud storage systems supporting secure sharing
by: Yan SONG, et al.
Published: (2017-10-01)