完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChu, Cheng-Kangen_US
dc.contributor.authorTzeng, Wen-Gueyen_US
dc.date.accessioned2014-12-08T15:07:01Z-
dc.date.available2014-12-08T15:07:01Z-
dc.date.issued2007en_US
dc.identifier.isbn978-3-540-75495-4en_US
dc.identifier.issn0302-9743en_US
dc.identifier.urihttp://hdl.handle.net/11536/5490-
dc.description.abstractA proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. In this paper, we propose two identity-based proxy re-encryption schemes, which are both proved secure in the standard model. The first one is efficient in both computation and ciphertext length, and the other one achieves chosen-ciphertext security. Our solutions answer the open problems left in the previous work.en_US
dc.language.isoen_USen_US
dc.subjectproxy re-encryptionen_US
dc.subjectidentity-based encryptionen_US
dc.subjectstandard modelen_US
dc.titleIdentity-based proxy re-encryption without random oraclesen_US
dc.typeArticleen_US
dc.identifier.journalInformation Security, Proceedingsen_US
dc.citation.volume4779en_US
dc.citation.spage189en_US
dc.citation.epage202en_US
dc.contributor.department交大名義發表zh_TW
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentNational Chiao Tung Universityen_US
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000250750300013-
顯示於類別:會議論文