Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption (English)
- New search for: Kawai, Yutaka
- New search for: Lopez, Javier
- New search for: Wu, Yongdong
- Further information on Wu, Yongdong:
- https://orcid.org/https://orcid.org/0000-0002-0850-724X
- New search for: Kawai, Yutaka
In:
Information Security Practice and Experience
: 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
;
Chapter: 21
;
301-315
;
2015
- Article/Chapter (Book) / Electronic Resource
-
Title:Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption
-
Additional title:Lect.Notes Computer
-
Contributors:
-
Conference:International Conference on Information Security Practice and Experience ; 2015 ; Beijing, China
-
Published in:Information Security Practice and Experience : 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings ; Chapter: 21 ; 301-315Lecture Notes in Computer Science ; 9065 ; 301-315Security and Cryptology ; 301-315
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2015-01-01
-
Size:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Operating System Security Policy Hardening via Capability Dependency GraphsHan, Zhihui / Cheng, Liang / Zhang, Yang / Feng, Dengguo et al. | 2015
- 2
-
Expanding an Operating System’s Working Space with a New Mode to Support Trust MeasurementWei, Chenglong / Shi, Wenchang / Qin, Bo / Liang, Bin et al. | 2015
- 3
-
Differential Fault Analysis of StreebogAlTawy, Riham / Youssef, Amr M. et al. | 2015
- 4
-
Fault Attacks on Stream Cipher ScreamDu, Shaoyu / Zhang, Bin / Li, Zhenqi / Lin, Dongdai et al. | 2015
- 5
-
New Related Key Attacks on the RAKAPOSHI Stream CipherDing, Lin / Jin, Chenhui / Guan, Jie / Zhang, Shaowu / Cui, Ting / Zhao, Wei et al. | 2015
- 6
-
Cramer-Shoup Like Chosen Ciphertext Security from LPNSun, Xiaochao / Li, Bao / Lu, Xianhui et al. | 2015
- 7
-
Partial Prime Factor Exposure Attacks on RSA and Its Takagi’s VariantPeng, Liqiang / Hu, Lei / Huang, Zhangjie / Xu, Jun et al. | 2015
- 8
-
Analysis of Fractional ωmbNAF for Scalar MultiplicationLi, Weixuan / Yu, Wei / Wang, Kunpeng et al. | 2015
- 9
-
On the Effectiveness of Different Botnet Detection ApproachesHaddadi, Fariba / Le Cong, Duc / Porter, Laura / Zincir-Heywood, A. Nur et al. | 2015
- 10
-
Strongly Secure Key Exchange Protocol with Minimal KEMTian, Baoping / Wei, Fushan / Ma, Chuangui et al. | 2015
- 11
-
sHMQV: An Efficient Key Exchange Protocol for Power-Limited DevicesZhao, Shijun / Zhang, Qianying et al. | 2015
- 12
-
Models of Curves from GHS Attack in Odd CharacteristicTian, Song / Yu, Wei / Li, Bao / Wang, Kunpeng et al. | 2015
- 13
-
Some Elliptic Subcovers of Genus 3 Hyperelliptic CurvesTian, Song / Yu, Wei / Li, Bao / Wang, Kunpeng et al. | 2015
- 14
-
Batch Blind Signatures on Elliptic CurvesSun, Yang / Wu, Qianhong / Qin, Bo / Wang, Yujue / Liu, Jianwei et al. | 2015
- 15
-
Improved Differential Analysis of Block Cipher PRIDEYang, Qianqian / Hu, Lei / Sun, Siwei / Qiao, Kexin / Song, Ling / Shan, Jinyong / Ma, Xiaoshuang et al. | 2015
- 16
-
Estimating Differential-Linear Distinguishers and Applications to CTC2Guo, Chun / Zhang, Hailong / Lin, Dongdai et al. | 2015
- 17
-
Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGIDu, Shaoyu / Li, Zhenqi / Zhang, Bin / Lin, Dongdai et al. | 2015
- 18
-
Half a Century of Practice: Who Is Still Storing Plaintext Passwords?Bauman, Erick / Lu, Yafeng / Lin, Zhiqiang et al. | 2015
- 19
-
User Identity Verification Based on Touchscreen Interaction Analysis in Web ContextsVelten, Michael / Schneider, Peter / Wessel, Sascha / Eckert, Claudia et al. | 2015
- 20
-
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference MethodCheng, Shantian / Zhang, Juanyang et al. | 2015
- 21
-
Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryptionKawai, Yutaka et al. | 2015
- 22
-
Revocable Threshold Attribute-Based Signature against Signing Key ExposureWei, Jianghong / Huang, Xinyi / Hu, Xuexian / Liu, Wenfen et al. | 2015
- 23
-
Fully Secure Online/Offline Predicate and Attribute-Based EncryptionDatta, Pratish / Dutta, Ratna / Mukhopadhyay, Sourav et al. | 2015
- 24
-
A Rapid and Scalable Method for Android Application Repackaging DetectionJiao, Sibei / Cheng, Yao / Ying, Lingyun / Su, Purui / Feng, Dengguo et al. | 2015
- 25
-
Comprehensive Analysis of the Android Google Play’s Auto-update PolicySanders, Craig / Shah, Ayush / Zhang, Shengzhi et al. | 2015
- 26
-
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component CommunicationFang, Zhejun / Liu, Qixu / Zhang, Yuqing / Wang, Kai / Wang, Zhiqiang et al. | 2015
- 27
-
New Constructions of T-functionRoy, Dibyendu / Chaturvedi, Ankita / Mukhopadhyay, Sourav et al. | 2015
- 28
-
A New Lattice-Based Threshold Attribute-Based Signature SchemeWang, Qingbin / Chen, Shaozhen / Ge, Aijun et al. | 2015
- 29
-
Hard Invalidation of Electronic SignaturesHanzlik, Lucjan / Kutyłowski, Mirosław / Yung, Moti et al. | 2015
- 30
-
Lightweight Function Pointer AnalysisZhang, Wei / Zhang, Yu et al. | 2015
- 31
-
Accelerating RSA with Fine-Grained Parallelism Using GPUYang, Yang / Guan, Zhi / Sun, Huiping / Chen, Zhong et al. | 2015
- 32
-
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic SchemesFan, Guangjun / Zhou, Yongbin / Standaert, François-Xavier / Feng, Dengguo et al. | 2015
- 33
-
Non-interactive Revocable Identity-Based Access Control over e-Healthcare RecordsZhou, Yunya / Liu, Jianwei / Deng, Hua / Qin, Bo / Zhang, Lei et al. | 2015
- 34
-
Efficient File Sharing in Electronic Health RecordsGritti, Clémentine / Susilo, Willy / Plantard, Thomas et al. | 2015
- 35
-
A Framework for Analyzing Verifiability in Traditional and Electronic ExamsDreier, Jannik / Giustolisi, Rosario / Kassem, Ali / Lafourcade, Pascal / Lenzini, Gabriele et al. | 2015
- 36
-
ADKAM: A-Diversity K-Anonymity Model via MicroaggregationCheng, Liang / Cheng, Shaoyin / Jiang, Fan et al. | 2015
- 37
-
Visualizing Privacy Risks of Mobile Applications through a Privacy MeterKang, Jina / Kim, Hyoungshick / Cheong, Yun Gyung / Huh, Jun Ho et al. | 2015
- 38
-
One-Round Witness Indistinguishability from Indistinguishability ObfuscationNiu, Qihua / Li, Hongda / Huang, Guifang / Liang, Bei / Tang, Fei et al. | 2015
- 39
-
Erratum: A Rapid and Scalable Method for Android Application Repackaging DetectionJiao, Sibei / Cheng, Yao / Ying, Lingyun / Su, Purui / Feng, Dengguo et al. | 2015