Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme

@article{Abdalla2016IntegratingTF,
  title={Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme},
  author={Hisham Abdalla and Xiong Hu and Abubaker Wahaballa and Ahmed Abdalla Ali and Mohammed Ramadan and Zhiguang Qin},
  journal={I. J. Network Security},
  year={2016},
  volume={19},
  pages={27-38}
}
The current Digital Rights Management (DRM) systems use attribute-based encryption (ABE) and proxy re-encryption (PRE) to achieve fine-grained access control in cloud computing. However, these schemes have some limitations particularly in terms of security, functionality and also higher decryption time which grows linearly with the complexity of access policies. In this paper, we propose a novel DRM scheme founded on a deterministic finite automata-based functional proxy re-encryption (DFA… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 28 REFERENCES