{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:35:54Z","timestamp":1765438554531,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030026066"},{"type":"electronic","value":"9783030026073"}],"license":[{"start":{"date-parts":[[2018,10,17]],"date-time":"2018-10-17T00:00:00Z","timestamp":1539734400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-02607-3_18","type":"book-chapter","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T08:53:30Z","timestamp":1539680010000},"page":"192-198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme"],"prefix":"10.1007","author":[{"given":"Xu An","family":"Wang","sequence":"first","affiliation":[]},{"given":"Arun Kumar","family":"Sangaiah","sequence":"additional","affiliation":[]},{"given":"Nadia","family":"Nedjah","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Zuliang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,17]]},"reference":[{"key":"18_CR1","first-page":"127","volume-title":"Lecture Notes in Computer Science","author":"Matt Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT\u201998. Volume 1403 of LNCS, pp. 127\u2013144, Espoo, Finland, May\u00a031\u2013June\u00a04, 1998. Springer, Berlin"},{"key":"18_CR2","unstructured":"Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: NDSS\u00a02003, San Diego, California, USA, February\u00a05\u20137, 2003. The Internet Society"},{"key":"18_CR3","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS\u00a02005, San Diego, California, USA, February\u00a03\u20134, 2005. The Internet Society"},{"issue":"1","key":"18_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/11602897_24","volume-title":"Information and Communications Security","author":"Yun-Peng Chiu","year":"2005","unstructured":"Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 05. Volume 3783 of LNCS, pp. 280\u2013290, Beijing, China, December\u00a010\u201313, 2005. Springer, Berlin, Germany (2005)"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-02620-1_23","volume-title":"Information Security and Privacy","author":"Cheng-Kang Chu","year":"2009","unstructured":"Chu, C., Chow, S., Weng, J., Zhou, J., Deng, R.H.: Conditional proxy broadcast re-encryption. In: ACISP 2009. Volume 5594 of LNCS, pp. 327\u2013342 (2009)"},{"issue":"5","key":"18_CR7","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1002\/sec.326","volume":"5","author":"J Shao","year":"2012","unstructured":"Shao, J., Liu, P., Wei, G., Ling, Y.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439\u2013449 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"10","key":"18_CR8","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1109\/TIFS.2014.2346023","volume":"9","author":"K Liang","year":"2014","unstructured":"Liang, K., Au, M.H., Liu, J.K., Qi, X., Susilo, W., Tran, X.P., Wong, D.S., Yang, G.: A dfa-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans. Inf. Forensics Secur. 9(10), 1667\u20131680 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-11203-9_15","volume-title":"Computer Security - ESORICS 2014","author":"Kaitai Liang","year":"2014","unstructured":"Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS\u00a02014, Part I. Volume 8712 of LNCS, pp. 257\u2013272, Wroclaw, Poland, September\u00a07\u201311, 2014. Springer, Berlin, Germany"},{"issue":"1","key":"18_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJGUC.2016.073773","volume":"7","author":"Ying Wang","year":"2016","unstructured":"Wang, Ying, Jiali, Du, Cheng, Xiaochun, Liu, Zheli, Lin, Kai: Degradation and encryption for outsourced PNG images in cloud storage. Int. J. Grid Util. Comput. 7(1), 22\u201328 (2016)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"2","key":"18_CR11","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1504\/IJGUC.2015.068824","volume":"6","author":"Shuaishuai Zhu","year":"2015","unstructured":"Zhu, Shuaishuai, Yang, Xiaoyuan: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91\u201397 (2015)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"2","key":"18_CR12","first-page":"1","volume":"6","author":"Shu Guo","year":"2015","unstructured":"Guo, Shu, Haixia, Xu: A secure delegation scheme of large polynomial computation in multi-party cloud. Int. J. Grid Util. Comput. 6(2), 1\u20137 (2015)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"2","key":"18_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1504\/IJSSC.2014.062468","volume":"4","author":"Cristina Dutu","year":"2014","unstructured":"Dutu, Cristina, Apostol, Elena, Leordeanu, Catalin, Cristea, Valentin: A solution for the management of multimedia sessions in hybrid clouds. Int. J. Space-Based Situated Comput. 4(2), 77\u201387 (2014)","journal-title":"Int. J. Space-Based Situated Comput."},{"issue":"2","key":"18_CR14","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1504\/IJSSC.2014.062469","volume":"4","author":"Meriem Thabet","year":"2014","unstructured":"Thabet, Meriem, Boufaida, Mahmoud, Kordon, Fabrice: An approach for developing an interoperability mechanism between cloud providers. Int. J. Space-Based Situated Comput. 4(2), 88\u201399 (2014)","journal-title":"Int. J. Space-Based Situated Comput."},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-17650-0_27","volume-title":"Information and Communications Security","author":"Lihua Wang","year":"2010","unstructured":"Wang, L., Wang, L., Mambo,M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. In: Soriano, M., Qing, S., L\u00f3pez, J. (eds.) ICICS 10. Volume 6476 of LNCS, pp. 383\u2013400, Barcelona, Spain, December\u00a015\u201317, 2010. Springer, Berlin, Germany"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-38033-4_10","volume-title":"Information Security Practice and Experience","author":"Kaitai Liang","year":"2013","unstructured":"Liang, K., Huang, Q., Schlegel, R., Wong, D.S., Tang, C.: A conditional proxy broadcast re-encryption scheme supporting timed-release. In: ISPEC 2013. LNCS, vol. 7863, pp. 132\u2013146. Springer, Heidelberg (2013)"},{"key":"18_CR17","unstructured":"X. Wang, X. Yang, F. Li. On the Role of PKG for Proxy Re-encryption in the Identity Based Setting. Available at Cryptology ePrint Archive, Report 2008\/410, 2008"},{"key":"18_CR18","first-page":"322","volume":"2009","author":"J Weng","year":"2009","unstructured":"Weng, J., Deng, R.H., Chu, C., Ding, X., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. ACM ASIACCS 2009, 322\u2013332 (2009)","journal-title":"ACM ASIACCS"},{"key":"18_CR19","first-page":"151","volume-title":"Lecture Notes in Computer Science","author":"Jian Weng","year":"2009","unstructured":"Weng, J., Yang, Y., Tang, Q., Deng, R., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: ISC 2009. Volume 5735 of LNCS, pp. 151\u2013166 (2008)"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/s11432-010-0047-3","volume":"53","author":"J Weng","year":"2010","unstructured":"Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53, 593\u2013606 (2010)","journal-title":"Sci. China Inf. Sci."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Cryptology ePrint Archive, Report 2010\/265, 2010. Available at http:\/\/eprint.iacr.org","DOI":"10.1007\/s11432-010-0047-3"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-12678-9_19","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"Sherman S. M. Chow","year":"2010","unstructured":"Chow, S., Weng, J., Yang, Y., Deng, R.: Efficient unidirectional proxy re-encryption. In: AFRICACRYPT 2010. Volume 6055 of LNCS, pp. 316\u2013332 (2010)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02607-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T15:10:14Z","timestamp":1719069014000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02607-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,17]]},"ISBN":["9783030026066","9783030026073"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02607-3_18","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2018,10,17]]},"assertion":[{"value":"17 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"3PGCIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pgcic2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}