This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing
In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows o...
People rely more on networks where security is the major issue in cloud storage. The growth of elect...
Cloud computing is an emerging computing paradigm, enabling users to store their data remotely in a ...
This paper addresses the always online behavior of the data owner in proxy re- encryption schemes fo...
Cloud computing provides scalable processing and storage resources that are hosted on a third-party ...
Outsourcing data to the cloud is beneficial for reasons of economy, scalability, and accessi-bility,...
With the ever-growing production of data coming from multiple, scattered, highly dynamical sources (...
This paper shows an overview on Proxy re-encryption procedures concerning secure cloud information a...
The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devic...
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate t...
The growth in Cloud Computing and the ubiquity of Mobile devices to access Cloud services has genera...
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-encryption (ABPRE) h...
The growth in Cloud Computing and the ubiquity of Mobile devices to access Cloud services has genera...
A cloud-based re-encryption scheme allows a semi-trusted cloud proxy to convert a ciphertext under d...
Mobile cloud computing is referred as the combination of cloud computing and mobile networks to brin...
In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows o...
People rely more on networks where security is the major issue in cloud storage. The growth of elect...
Cloud computing is an emerging computing paradigm, enabling users to store their data remotely in a ...
This paper addresses the always online behavior of the data owner in proxy re- encryption schemes fo...
Cloud computing provides scalable processing and storage resources that are hosted on a third-party ...
Outsourcing data to the cloud is beneficial for reasons of economy, scalability, and accessi-bility,...
With the ever-growing production of data coming from multiple, scattered, highly dynamical sources (...
This paper shows an overview on Proxy re-encryption procedures concerning secure cloud information a...
The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devic...
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate t...
The growth in Cloud Computing and the ubiquity of Mobile devices to access Cloud services has genera...
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-encryption (ABPRE) h...
The growth in Cloud Computing and the ubiquity of Mobile devices to access Cloud services has genera...
A cloud-based re-encryption scheme allows a semi-trusted cloud proxy to convert a ciphertext under d...
Mobile cloud computing is referred as the combination of cloud computing and mobile networks to brin...
In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows o...
People rely more on networks where security is the major issue in cloud storage. The growth of elect...
Cloud computing is an emerging computing paradigm, enabling users to store their data remotely in a ...