EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
DOI10.1016/J.JCSS.2014.04.021zbMATH Open1405.68023OpenAlexW1994169531WikidataQ121306461 ScholiaQ121306461MaRDI QIDQ2509596FDOQ2509596
Authors: Guiyi Wei, Rongxing Lu, Jun Shao
Publication date: 29 July 2014
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2014.04.021
Recommendations
- A secure cloud data sharing scheme from identity-based proxy re-encryption
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
- Flexible attribute-based proxy re-encryption for efficient data sharing
- A dynamic type and identity-based proxy re-encryption scheme
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Internet topics (68M11) Network protocols (68M12)
Cites Work
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Improved proxy re-encryption schemes with applications to secure distributed storage
- CCA proxy re-encryption without bilinear maps in the standard model
- Title not available (Why is that?)
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- CCA-Secure Proxy Re-encryption without Pairings
- Key-Private Proxy Re-encryption
- Conditional Proxy Broadcast Re-Encryption
- Securely Obfuscating Re-encryption
Cited In (1)
Uses Software
This page was built for publication: EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2509596)