2014
DOI: 10.1109/tifs.2014.2346023
|View full text |Cite
|
Sign up to set email alerts
|

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing

Abstract: — In this paper, for the first time, we define a general\ud notion for proxy re-encryption (PRE), which we call deterministic\ud finite automata-based functional PRE (DFA-based FPRE).\ud Meanwhile, we propose the first and concrete DFA-based FPRE\ud system, which adapts to our new notion. In our scheme, a message\ud is encrypted in a ciphertext associated with an arbitrary length\ud index string, and a decryptor is legitimate if and only if a DFA\ud associated with his/her secret key accepts the string. Furthe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
39
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
3

Relationship

2
8

Authors

Journals

citations
Cited by 95 publications
(39 citation statements)
references
References 19 publications
0
39
0
Order By: Relevance
“…This PRE scheme allows a ciphertext in PKI-based systems to be converted into a ciphertext for an identity in IBE system, although it does not support the broadcasting mechanism in encryption. Liang [23] deployed the concept of PRE to achieve revocability in identity-based setting and further generalized the concept of PRE into any DFA-based functional setting [21]. Shao [34] extended the concept of IBPRE to that of anonymous IBPRE (AIBPRE) and proposed an AIBPRE scheme to achieve the anonymity of recipients.…”
Section: Related Workmentioning
confidence: 99%
“…This PRE scheme allows a ciphertext in PKI-based systems to be converted into a ciphertext for an identity in IBE system, although it does not support the broadcasting mechanism in encryption. Liang [23] deployed the concept of PRE to achieve revocability in identity-based setting and further generalized the concept of PRE into any DFA-based functional setting [21]. Shao [34] extended the concept of IBPRE to that of anonymous IBPRE (AIBPRE) and proposed an AIBPRE scheme to achieve the anonymity of recipients.…”
Section: Related Workmentioning
confidence: 99%
“…Afterwards, many PRE schemes have been proposed, such as [2], [3], [11], [18], [25], [20], [23], [26], [21].…”
Section: B Related Workmentioning
confidence: 99%
“…Due to its transformation property, PRE schemes can be used in many applications,including simplification of key distribution [1], key escrow [2], distributed file systems [3], [4], multicast [5], anonymous communication [6], DFA-based FPRE system [7], and cloud computation [8], [9]. Recently, the research of cloud email system has become more and more popular in business and organizations as it allows an enterprise to rent the cloud SaaS service to build an email system with less costs and maintenance efforts.…”
Section: Introductionmentioning
confidence: 99%