Corpus ID: 42614182

Time-Based Proxy Re-encryption Review

  title={Time-Based Proxy Re-encryption Review},
  author={Meghatai Maruti Bhoite and I. Rao},
  • Meghatai Maruti Bhoite, I. Rao
  • Published 2015
  • Fundamentals approach for secure data sharing in a cloud environment is to let the data owner encrypt data before outsourcing. To achieve fine-grained access control on encrypted data and scalable user revocation, existing work combines attribute-based encryption (ABE) and proxy re-encryption (PRE) to delegate the cloud service provider (CSP) to execute re-encryption. However, the data owner should be online in order to send the PRE keys to the CSP in a timely fashion, to prevent the revoked… CONTINUE READING

    Figures from this paper


    Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    • 231
    • Highly Influential
    • PDF
    Reliable Re-Encryption in Unreliable Clouds
    • 58
    • PDF
    Attribute based data sharing with attribute revocation
    • 816
    • PDF
    Ciphertext-Policy Attribute-Based Encryption
    • 3,568
    • PDF
    Attribute-based encryption for fine-grained access control of encrypted data
    • 4,413
    • PDF
    Identity-Based Proxy Re-encryption
    • 518
    • PDF
    Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    • 1,914
    • Highly Influential
    • PDF
    Distributed Attribute-Based Encryption
    • 202
    Secure attribute-based systems
    • 49
    Ciphertext policy attribute-based encryption from lattices
    • 44