2019
DOI: 10.1016/j.pmcj.2019.101081
|View full text |Cite
|
Sign up to set email alerts
|

Offline privacy preserving proxy re-encryption in mobile cloud computing

Abstract: This paper addresses the always online behavior of the data owner in proxy reencryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…1 Encryption [21,76,55,25,26,65,28,29,30,31,66,34,7,79,90,40,91,42,74,59,44,45,46,47,60,87,50,51,81,52,53,93,83,54,61] 2 Authentication [22,63,64,32,33,67,68,69,35,70,41,57,43,71,72,75,48,49,…”
Section: # Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…1 Encryption [21,76,55,25,26,65,28,29,30,31,66,34,7,79,90,40,91,42,74,59,44,45,46,47,60,87,50,51,81,52,53,93,83,54,61] 2 Authentication [22,63,64,32,33,67,68,69,35,70,41,57,43,71,72,75,48,49,…”
Section: # Solutionsmentioning
confidence: 99%
“…[21,22,23,24,25,26, 27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54] 2 Cryptography[21,55,24,25,26, 27,28,29,30,31,36,37,39,41,56,57,58,59,44,45,46,…”
mentioning
confidence: 99%