Over years, cloud computing has been rapidly chang-ing the shape of modern computing environment. The problem of how to keep the confidentiality of user data against malicious entities including a cloud service provider has been recognized as a significant issue. This prob-lem becomes even more complicated if a data is shared among multiple users. Recently, the idea of proxy re-encryption has been introduced to support secure data sharing among group members in cloud environment. However, in this scheme, a malicious user can collude with the server to decrypt unauthorized messages. The conditional proxy re-encryption (CPRE) aims to fix this problem by introducing a condition value into message encryption process and re-encryption key genera...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted ...
Cloud computing, which provides adequate storage and computation capability, has been a prevalent in...
Over years, cloud computing has been rapidly changing the shape of modern computing environment. The...
Abstract—Conditional PRE (CPRE) is a novel public key primitive which enables the group sharing of c...
Conditional PRE (CPRE) is a novel public key primitive which enables the group sharing of confidenti...
In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a d...
The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devic...
The importance of cloud computing is the users can accomplish an effective and economical approach f...
2017, Springer International Publishing AG. Outsource local data to remote cloud has become prevalen...
In order to solve the challenges of user data security in the cloud computing (storage) environment,...
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-encryption (ABPRE) h...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate t...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted ...
Cloud computing, which provides adequate storage and computation capability, has been a prevalent in...
Over years, cloud computing has been rapidly changing the shape of modern computing environment. The...
Abstract—Conditional PRE (CPRE) is a novel public key primitive which enables the group sharing of c...
Conditional PRE (CPRE) is a novel public key primitive which enables the group sharing of confidenti...
In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a d...
The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devic...
The importance of cloud computing is the users can accomplish an effective and economical approach f...
2017, Springer International Publishing AG. Outsource local data to remote cloud has become prevalen...
In order to solve the challenges of user data security in the cloud computing (storage) environment,...
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-encryption (ABPRE) h...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate t...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted ...
Cloud computing, which provides adequate storage and computation capability, has been a prevalent in...