An Identity-Based Proxy Re-Encryption Scheme With Single-Hop Conditional Delegation and Multi-Hop Ciphertext Evolution for Secure Cloud Data Sharing.
Shimao YaoRalph Voltaire J. DayotIn-Ho RaLiya XuZhuolin MeiJiaoli ShiPublished in: IEEE Trans. Inf. Forensics Secur. (2023)
Keyphrases
- end to end
- multi hop
- encryption scheme
- data sharing
- ciphertext
- attribute based encryption
- standard model
- cloud storage
- ad hoc networks
- cca secure
- security analysis
- data access
- diffie hellman
- identity based encryption
- data integration
- peer to peer
- information sharing
- secret key
- private key
- proxy re encryption
- secret sharing scheme
- sensitive data
- encryption algorithm
- mobile ad hoc networks
- access structure
- security model
- cloud computing
- encrypted data
- access control
- routing algorithm
- routing protocol
- security policies
- databases
- low cost
- management system
- database systems