Secret Data Access Based on Proxy Re-encryption
碩士 === 國立中央大學 === 資訊工程學系 === 105 === Proxy re-encryption schemes enable users to share their digital content with other parties in a more ecient way. In existing proxy re-encryption schemes, the security issues of key exposure attack and unauthorized re-encryption and the performance challenges have...
Main Authors: | Hsueh-Cheng Chen, 陳學呈 |
---|---|
Other Authors: | Sung-Ming Yen |
Format: | Others |
Language: | zh-TW |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/bdsa7t |
Similar Items
-
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
by: Kunwar Singh, et al.
Published: (2021-01-01) -
Attribute-Based Proxy Re-Encryption
by: Chun-Hung Chen, et al.
Published: (2012) -
Revocable attribute-based proxy re-encryption
by: Luo Fucai, et al.
Published: (2021-05-01) -
Proxy Re-Encryption in Access Control Framework of Information-Centric Networks
by: Qiang Wang, et al.
Published: (2019-01-01) -
The Research of Attribute Based Encryption Schemes with Proxy Re-Encryption Capability
by: Yan-Hong Zheng, et al.
Published: (2011)