logo

SCIENCE CHINA Information Sciences, Volume 64 , Issue 6 : 169301(2021) https://doi.org/10.1007/s11432-019-2856-8

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs

More info
  • ReceivedNov 13, 2019
  • AcceptedMar 18, 2020
  • PublishedJul 15, 2020

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported in part by National Natural Science Foundation of China (Grant No. 61802214), National Natural Science Foundation of Shandong Province, China (Grant No. ZR2019BF009), Applied Fundamental Research Project of Qingdao (Grant No. 19-6-2-6-cg), and Foundation of Guizhou Provincial Key Laboratory of Public Big Data (Grant No. 2019BDKFJJ007).


References

[1] Li Z, Ma C, Wang D. Achieving Multi-Hop PRE via Branching Program. IEEE Trans Cloud Comput, 2020, 8: 45-58 CrossRef Google Scholar

[2] Zengpeng Li, Chunguang Ma and Ding Wang. Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program. IEEE Access, 2017, (5):16214--16228. Google Scholar

[3] Li Z P, Ma C G, Wang D, et al. Toward proxy re-encryption from learning with errors in the exponent. In: Proceedings of Trust Security and Privacy in Computing and Communications, 2017. 683--690. Google Scholar

[4] Ge C, Susilo W, Fang L. A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Des Codes Cryptogr, 2018, 86: 2587-2603 CrossRef Google Scholar

[5] Boneh D, Waters B. Constrained pseudorandom functions and their applications. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2013. 280--300. Google Scholar

[6] Kiayias A, Papadopoulos S, Triandopoulos N, et al. Delegatable pseudorandom functions and applications. In: Proceedings of Computer and Communications Security, 2013. 669--684. Google Scholar

[7] Boyle E, Goldwasser S, Ivan I. Functional signatures and pseudorandom functions. In: Proceedings of Public Key Cryptography, 2014. 501--519. Google Scholar

[8] Banerjee A, Fuchsbauer G, Peikert C, et al. Key-homomorphic constrained pseudorandom functions. In: Proceedings of Theory of Cryptography Conference, 2015. 31--60. Google Scholar

[9] Boneh D, Gennaro R, Goldfeder S, et al. Threshold cryptosystems from threshold fully homomorphic encryption. In: Proceedings of International Cryptology Conference, 2018. 565--596. Google Scholar