{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:34Z","timestamp":1742913634839,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030026066"},{"type":"electronic","value":"9783030026073"}],"license":[{"start":{"date-parts":[[2018,10,17]],"date-time":"2018-10-17T00:00:00Z","timestamp":1539734400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-02607-3_44","type":"book-chapter","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T08:53:30Z","timestamp":1539680010000},"page":"478-485","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Outsourcing Online\/offline Proxy Re-encryption for Mobile Cloud Storage Sharing"],"prefix":"10.1007","author":[{"given":"Xu An","family":"Wang","sequence":"first","affiliation":[]},{"given":"Nadia","family":"Nedjah","sequence":"additional","affiliation":[]},{"given":"Arun Kumar","family":"Sangaiah","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Zuliang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,17]]},"reference":[{"key":"44_CR1","first-page":"127","volume-title":"Lecture Notes in Computer Science","author":"Matt Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT\u201998. Volume 1403 of LNCS, pp. 127\u2013144, Espoo, Finland, May\u00a031\u2013June\u00a04, 1998. Springer, Berlin"},{"key":"44_CR2","unstructured":"A., Dodis, Y.: Proxy cryptography revisited. In: NDSS\u00a02003, San Diego, California, USA, February\u00a05\u20137, 2003. The Internet Society"},{"key":"44_CR3","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS\u00a02005, San Diego, California, USA, February\u00a03\u20134, 2005. The Internet Society"},{"issue":"1","key":"44_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/11602897_24","volume-title":"Information and Communications Security","author":"Yun-Peng Chiu","year":"2005","unstructured":"Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 05. Volume 3783 of LNCS, pp. 280\u2013290, Beijing, China, December\u00a010\u201313, 2005. Springer, Berlin, Germany (2005)"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Chu, C., Tzeng, W.: Identity-based proxy re-encryption without random oracles. In: ISC 2007. Volume 4779 of LNCS, pp. 189\u2013202 (2007)","DOI":"10.1007\/978-3-540-75496-1_13"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: ACNS 2007. Volume 4521 of LNCS, pp. 288\u2013306 (2007)","DOI":"10.1007\/978-3-540-72738-5_19"},{"issue":"5","key":"44_CR8","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1002\/sec.326","volume":"5","author":"J Shao","year":"2012","unstructured":"Shao, J., Liu, P., Wei, G., Ling, Y.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439\u2013449 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"44_CR9","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-11203-9_15","volume-title":"Computer Security - ESORICS 2014","author":"Kaitai Liang","year":"2014","unstructured":"Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS\u00a02014, Part I. Volume 8712 of LNCS, pp. 257\u2013272, Wroclaw, Poland, September\u00a07\u201311, 2014. Springer, Berlin, Germany"},{"issue":"1","key":"44_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJGUC.2016.073773","volume":"7","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Jiali, D., Cheng, X., Liu, Z., Lin, K.: Degradation and encryption for outsourced png images in cloud storage. Int. J. Grid Util. Comput. 7(1), 22\u201328 (2016)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"2","key":"44_CR11","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1504\/IJGUC.2015.068824","volume":"6","author":"S Zhu","year":"2015","unstructured":"Zhu, S., Yang, X.: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91\u201397 (2015)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"2","key":"44_CR12","first-page":"1","volume":"6","author":"S Guo","year":"2015","unstructured":"Guo, S., Haixia, X.: A secure delegation scheme of large polynomial computation in multi-party cloud. Int. J. Grid Util. Comput. 6(2), 1\u20137 (2015)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"2","key":"44_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1504\/IJSSC.2014.062468","volume":"4","author":"C Dutu","year":"2014","unstructured":"Dutu, C., Apostol, E., Leordeanu, C., Cristea, V.: A solution for the management of multimedia sessions in hybrid clouds. Int. J. Space-Based Situated Comput. 4(2), 77\u201387 (2014)","journal-title":"Int. J. Space-Based Situated Comput."},{"issue":"2","key":"44_CR14","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1504\/IJSSC.2014.062469","volume":"4","author":"M Thabet","year":"2014","unstructured":"Thabet, M., Boufaida, M., Kordon, F.: An approach for developing an interoperability mechanism between cloud providers. Int. J. Space-Based Situated Comput. 4(2), 88\u201399 (2014)","journal-title":"Int. J. Space-Based Situated Comput."},{"key":"44_CR15","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-17650-0_27","volume-title":"Information and Communications Security","author":"Lihua Wang","year":"2010","unstructured":"Wang, L., Wang, L., Mambo,M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. In: Soriano, M., Qing, S., L\u00f3pez, J. (eds.) ICICS 10. Volume 6476 of LNCS, pp. 383\u2013400, Barcelona, Spain, December\u00a015\u201317, 2010. Springer, Berlin, Germany"},{"key":"44_CR16","doi-asserted-by":"crossref","unstructured":"Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Cryptology ePrint Archive, Report 2010\/265, 2010. Available at http:\/\/eprint.iacr.org","DOI":"10.1007\/s11432-010-0047-3"},{"key":"44_CR17","first-page":"151","volume-title":"Lecture Notes in Computer Science","author":"Jian Weng","year":"2009","unstructured":"Weng, J., Yang, Y., Tang, Q., Deng, R., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: ISC 2009. Volume 5735 of LNCS, pp. 151\u2013166 (2008)"},{"issue":"13","key":"44_CR18","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.1016\/j.ins.2010.03.026","volume":"180","author":"Jun Shao","year":"2010","unstructured":"Shao, J., Cao, Z., Liang, X., Lin, H.: Proxy re-encryption with keyword search. In: Information Science 2010 (2010), https:\/\/doi.org\/10.1016\/j.ins.2010.03.026","journal-title":"Information Sciences"},{"key":"44_CR19","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-00468-1_20","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"Jun Shao","year":"2009","unstructured":"Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairing. In: PKC 2009. LNCS 5443, pp. 357\u2013376. Springer, Berlin (2009)"},{"key":"44_CR20","first-page":"276","volume":"2009","author":"X Liang","year":"2009","unstructured":"Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. AISACCS 2009, 276\u2013286 (2009)","journal-title":"AISACCS"},{"issue":"1","key":"44_CR21","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1504\/IJWGS.2018.088394","volume":"14","author":"X Wang","year":"2018","unstructured":"Wang, X., Xhafa, F., Ma, J., Barolli, L., Ge, Y.: PRE+: dual of proxy re-encryption for secure cloud data sharing service. Int. J. Web Grid Serv. 14(1), 44\u201369 (2018)","journal-title":"Int. J. Web Grid Serv."},{"issue":"3","key":"44_CR22","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.jss.2011.09.035","volume":"85","author":"X Wang","year":"2012","unstructured":"Wang, X., Huang, X., Yang, X., Liu, L., Wu, X.: Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85(3), 643\u2013654 (2012)","journal-title":"J. Syst. Softw."},{"key":"44_CR23","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-89754-5_11","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"Qiang Tang","year":"2008","unstructured":"Tang, Q.: Type-based proxy re-encryption and its construction. In: INDOCRYPT 2008. Volume 5365 of LNCS, pp. 130\u2013144 (2008)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02607-3_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T15:13:40Z","timestamp":1719069220000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02607-3_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,17]]},"ISBN":["9783030026066","9783030026073"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02607-3_44","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2018,10,17]]},"assertion":[{"value":"17 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"3PGCIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pgcic2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}