Time-and-ID-Based Proxy Reencryption Scheme
Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was samp...
Saved in:
Main Authors: | Kambombo Mtonga, Anand Paul, Seungmin Rho |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | Journal of Applied Mathematics |
Online Access: | http://dx.doi.org/10.1155/2014/329198 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme
by: Huixian Li, et al.
Published: (2016-05-01) -
ID-based efficient and proactive threshold proxy signature in the standard model
by: YU Yi-ke1, et al.
Published: (2011-01-01) -
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
by: Kunwar Singh, et al.
Published: (2021-01-01) -
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01) -
Proxy re-signature scheme based on isomorphisms of polynomial
by: Hui-xian LI, et al.
Published: (2017-02-01)