完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Chu, Cheng-Kang | en_US |
dc.contributor.author | Tzeng, Wen-Guey | en_US |
dc.date.accessioned | 2014-12-08T15:07:01Z | - |
dc.date.available | 2014-12-08T15:07:01Z | - |
dc.date.issued | 2007 | en_US |
dc.identifier.isbn | 978-3-540-75495-4 | en_US |
dc.identifier.issn | 0302-9743 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/5490 | - |
dc.description.abstract | A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. In this paper, we propose two identity-based proxy re-encryption schemes, which are both proved secure in the standard model. The first one is efficient in both computation and ciphertext length, and the other one achieves chosen-ciphertext security. Our solutions answer the open problems left in the previous work. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | proxy re-encryption | en_US |
dc.subject | identity-based encryption | en_US |
dc.subject | standard model | en_US |
dc.title | Identity-based proxy re-encryption without random oracles | en_US |
dc.type | Article | en_US |
dc.identifier.journal | Information Security, Proceedings | en_US |
dc.citation.volume | 4779 | en_US |
dc.citation.spage | 189 | en_US |
dc.citation.epage | 202 | en_US |
dc.contributor.department | 交大名義發表 | zh_TW |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | National Chiao Tung University | en_US |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000250750300013 | - |
顯示於類別: | 會議論文 |