2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS) 2016
DOI: 10.1109/incos.2016.83
|View full text |Cite
|
Sign up to set email alerts
|

Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…In our work, the data owner (DO) is considered a fully trusted entity, a claim which goes in line with the work of [13] in which the authors entrust the encryptor to produce re-encryption keys reKey for the different users in order to control the re-encryption key issuing to the legitimate user. The cloud server in our paper is considered honest-but-curious, meaning it will execute all the operations under its responsibility but might want to get more insights into the user authentication and authorization operations, as well as into the decryption process.…”
Section: Security Modelmentioning
confidence: 83%
See 2 more Smart Citations
“…In our work, the data owner (DO) is considered a fully trusted entity, a claim which goes in line with the work of [13] in which the authors entrust the encryptor to produce re-encryption keys reKey for the different users in order to control the re-encryption key issuing to the legitimate user. The cloud server in our paper is considered honest-but-curious, meaning it will execute all the operations under its responsibility but might want to get more insights into the user authentication and authorization operations, as well as into the decryption process.…”
Section: Security Modelmentioning
confidence: 83%
“…We follow the work in [13] and entrust the DO to produce system wide public and master keys, data user public and private keys as well as parts of the user privilege key. As the generation of the privilege key requires both the DO and attribute authorities (AA), no single entity in our scheme possesses enough privileges to generate all the parameters on itself.…”
Section: Key-escrow Issuementioning
confidence: 99%
See 1 more Smart Citation
“…Thinking of the merits of identity-based algorithms, Wang et al [ 12 ] presented an ID-based PRE scheme (called IBPRE+) for secure cloud data sharing. In their scheme, the data owner could utilize a random number of encryption processes to dynamically control the capability of sharing.…”
Section: Research Backgroundsmentioning
confidence: 99%
“…On the contrary, a single-hop PRE only allows a ciphertext to be transformed once. In practice, a PRE scheme has lots of applications [ 9 , 10 , 11 , 12 ] in the real world such as forwarding of confidential e-mails, key escrow, key distribution, etc.…”
Section: Introductionmentioning
confidence: 99%