Parallel Optimized Attribute-Based Encryption Scheme Based on SM9
Abstract
References
Recommendations
Identity-Based Proxy Re-encryption Based on SM9
Information Security and CryptologyAbstractProxy re-encryption, as a cryptographic primitive, allows an untrusted proxy to transform a ciphertext encrypted with the data owner’s public key to a ciphertext encrypted with the authorized user’s public key, without any knowledge of the ...
Hybrid proxy re-encryption scheme for attribute-based encryption
Inscrypt'09: Proceedings of the 5th international conference on Information security and cryptologyIn ciphertext policy attribute based encryption (ABE) schemes the sender selects an access structure and generates a ciphertext,which decryptors can get plaintext if he has certain set of secret key associate with his attributeswhich satisfies the ...
Lattice-based certificateless encryption scheme
Certificateless public key cryptography (CL-PKC) can solve the problems of certificate management in a public key infrastructure (PKI) and of key escrows in identity-based public key cryptography (ID-PKC). In CL-PKC, the key generation center (KGC) does ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 56Total Downloads
- Downloads (Last 12 months)22
- Downloads (Last 6 weeks)8
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format