Time-Based Proxy Re-encryption Review
@inproceedings{Bhoite2015TimeBasedPR, title={Time-Based Proxy Re-encryption Review}, author={Meghatai Maruti Bhoite and I. Rao}, year={2015} }
Fundamentals approach for secure data sharing in a cloud environment is to let the data owner encrypt data before outsourcing. To achieve fine-grained access control on encrypted data and scalable user revocation, existing work combines attribute-based encryption (ABE) and proxy re-encryption (PRE) to delegate the cloud service provider (CSP) to execute re-encryption. However, the data owner should be online in order to send the PRE keys to the CSP in a timely fashion, to prevent the revoked… CONTINUE READING
References
SHOWING 1-10 OF 13 REFERENCES
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
- Computer Science
- Comput. Secur.
- 2011
- 231
- Highly Influential
- PDF
Reliable Re-Encryption in Unreliable Clouds
- Computer Science
- 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
- 2011
- 58
- PDF
Ciphertext-Policy Attribute-Based Encryption
- Computer Science
- 2007 IEEE Symposium on Security and Privacy (SP '07)
- 2007
- 3,568
- PDF
Attribute-based encryption for fine-grained access control of encrypted data
- Computer Science
- CCS '06
- 2006
- 4,413
- PDF
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
- Computer Science
- 2010 Proceedings IEEE INFOCOM
- 2010
- 1,914
- Highly Influential
- PDF