Corpus ID: 42614182

Time-Based Proxy Re-encryption Review

@inproceedings{Bhoite2015TimeBasedPR,
  title={Time-Based Proxy Re-encryption Review},
  author={Meghatai Maruti Bhoite and I. Rao},
  year={2015}
}
  • Meghatai Maruti Bhoite, I. Rao
  • Published 2015
  • Fundamentals approach for secure data sharing in a cloud environment is to let the data owner encrypt data before outsourcing. To achieve fine-grained access control on encrypted data and scalable user revocation, existing work combines attribute-based encryption (ABE) and proxy re-encryption (PRE) to delegate the cloud service provider (CSP) to execute re-encryption. However, the data owner should be online in order to send the PRE keys to the CSP in a timely fashion, to prevent the revoked… CONTINUE READING

    Figures from this paper.

    References

    SHOWING 1-10 OF 13 REFERENCES
    Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    • 228
    • Highly Influential
    • PDF
    Reliable Re-Encryption in Unreliable Clouds
    • 56
    • PDF
    Attribute based data sharing with attribute revocation
    • 811
    • PDF
    Ciphertext-Policy Attribute-Based Encryption
    • 3,526
    • PDF
    Attribute-based encryption for fine-grained access control of encrypted data
    • 4,361
    • PDF
    Identity-Based Proxy Re-encryption
    • 510
    • PDF
    Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    • 1,902
    • Highly Influential
    • PDF
    Distributed Attribute-Based Encryption
    • 200
    Secure attribute-based systems
    • 49
    Ciphertext policy attribute-based encryption from lattices
    • 43