{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:34:23Z","timestamp":1772908463193,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030014452","type":"print"},{"value":"9783030014469","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01446-9_7","type":"book-chapter","created":{"date-parts":[[2018,10,6]],"date-time":"2018-10-06T17:46:13Z","timestamp":1538847973000},"page":"111-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme"],"prefix":"10.1007","author":[{"given":"Arinjita","family":"Paul","sequence":"first","affiliation":[]},{"given":"Varshika","family":"Srinivasavaradhan","sequence":"additional","affiliation":[]},{"given":"S.","family":"Sharmila Deva Selvi","sequence":"additional","affiliation":[]},{"given":"C.","family":"Pandu Rangan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,7]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)","DOI":"10.1145\/1127345.1127346"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Kevin, F., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054122"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17(4), 297\u2013319 (2004)","journal-title":"J. Cryptol."},{"key":"7_CR6","unstructured":"Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. IACR Cryptology ePrint Archive, 2009:189 (2009)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-12678-9_19","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"SSM Chow","year":"2010","unstructured":"Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316\u2013332. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12678-9_19"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-72738-5_19","volume-title":"Applied Cryptography and Network Security","author":"M Green","year":"2007","unstructured":"Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288\u2013306. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72738-5_19"},{"issue":"3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.future.2012.07.010","volume":"29","author":"J Han","year":"2013","unstructured":"Han, J., Susilo, W., Mu, Y.: Identity-based data storage in cloud computing. Future Gener. Comput. Syst. 29(3), 673\u2013681 (2013)","journal-title":"Future Gener. Comput. Syst."},{"issue":"23","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1260","DOI":"10.1016\/j.ipl.2009.09.010","volume":"109","author":"WK Koo","year":"2009","unstructured":"Koo, W.K., Hwang, J.Y., Lee, D.H.: Security vulnerability in a non-interactive id-based proxy re-encryption scheme. Inf. Process. Lett. 109(23), 1260\u20131262 (2009)","journal-title":"Inf. Process. Lett."},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-540-85538-5_22","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2008","author":"B Libert","year":"2008","unstructured":"Libert, B., Vergnaud, D.: Tracing malicious proxies in proxy re-encryption. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 332\u2013353. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85538-5_22"},{"issue":"9","key":"7_CR12","first-page":"337","volume":"9","author":"J Qiu","year":"2015","unstructured":"Qiu, J., Jo, J., Lee, H.: Collusion-resistant identity-based proxy re-encryption without random oracles. Int. J. Secur. Appl. 9(9), 337\u2013344 (2015)","journal-title":"Int. J. Secur. Appl."},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1002\/sec.109","volume":"4","author":"J Shao","year":"2011","unstructured":"Shao, J., Cao, Z., Liu, P.: SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Secur. Commun. Netw. 4(2), 122\u2013135 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"7_CR14","unstructured":"Srinivasavaradhan, V., Paul, A., Sharmila Deva Selvi, S., Pandu Rangan, C.: A CCA-secure collusion-resistant identity-based proxy re-encryption scheme (full version). Cryptology ePrint Archive, August 2018"},{"key":"7_CR15","unstructured":"Smith, T: DVD Jon: buy DRM-less tracks from Apple iTunes (2005). http:\/\/www.theregister.co.uk\/2005\/03\/18\/itunes pymusique"},{"issue":"2","key":"7_CR16","first-page":"179","volume":"4","author":"S Sree Vivek","year":"2012","unstructured":"Sree Vivek, S., Sharmila Deva Selvi, S., Radhakishan, V., Pandu Rangan, C.: Efficient conditional proxy re-encryption with chosen ciphertext security. Int. J. Netw. Secur. Appl. 4(2), 179 (2012)","journal-title":"Int. J. Netw. Secur. Appl."},{"issue":"11","key":"7_CR17","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1002\/sec.861","volume":"7","author":"H Wang","year":"2014","unstructured":"Wang, H., Zeng, P., Choo, K.-K.R.: MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. Securi. Commun. Netw. 7(11), 1641\u20131651 (2014)","journal-title":"Securi. Commun. Netw."},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-17455-1_21","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"L Wang","year":"2010","unstructured":"Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity-based proxy re-encryption schemes to prevent collusion attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327\u2013346. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17455-1_21"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Wang, X.A., Zhong, W.: A new identity based proxy re-encryption scheme. In: 2010 International Conference on Biomedical Engineering and Computer Science, pp. 1\u20134, April 2010","DOI":"10.1109\/ICBECS.2010.5462448"},{"key":"7_CR20","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1007\/978-3-319-49106-6_86","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications","author":"L Zhang","year":"2017","unstructured":"Zhang, L., Ma, H., Liu, Z., Dong, E.: Security analysis and improvement of a collusion-resistant identity-based proxy re-encryption scheme. In: Barolli, L., Xhafa, F., Yim, K. (eds.) Advances on Broad-Band Wireless Computing, Communication and Applications. LNDECT, vol. 2, pp. 839\u2013846. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-49106-6_86"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01446-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T17:31:53Z","timestamp":1572024713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01446-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030014452","9783030014469"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01446-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssl.informatics.uow.edu.au\/provsec2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}