Time-and-ID-Based Proxy Reencryption Scheme
Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was samp...
Saved in:
Main Authors: | Kambombo Mtonga, Anand Paul, Seungmin Rho |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | Journal of Applied Mathematics |
Online Access: | http://dx.doi.org/10.1155/2014/329198 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme
by: Huixian Li, et al.
Published: (2016-05-01) -
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
by: Kunwar Singh, et al.
Published: (2021-01-01) -
Attacks on One Designated Verifier Proxy Signature Scheme
by: Baoyuan Kang
Published: (2012-01-01) -
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
by: Jiahui Chen, et al.
Published: (2020-04-01) -
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
by: Nai-Wei Lo, et al.
Published: (2014-01-01)