{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:44:36Z","timestamp":1770219876295,"version":"3.49.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319124742","type":"print"},{"value":"9783319124759","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12475-9_15","type":"book-chapter","created":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T05:25:19Z","timestamp":1412141119000},"page":"206-222","source":"Crossref","is-referenced-by-count":24,"title":["Fine-Grained Conditional Proxy Re-Encryption and Application"],"prefix":"10.1007","author":[{"given":"Yanjiang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Haibing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Youcheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In: Proc. of NDSS 2005, pp. 29\u201343 (2005)"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G. Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. ACM Transactions on Information and System Security (TISSEC)\u00a09(1), 1\u201330 (2006)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-10868-6_17","volume-title":"Cryptography and Coding","author":"N. Attrapadung","year":"2009","unstructured":"Attrapadung, N., Imai, H.: Attribute-Based Encryption Supporting Direct\/Indirect Revocation Modes. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol.\u00a05921, pp. 278\u2013300. Springer, Heidelberg (2009)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.J.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 127\u2013144. Springer, Heidelberg (1998)"},{"key":"15_CR5","unstructured":"Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: A Method for Fast Revocation of Public Key Certificates and Security Capabilities. In: Proc. USENIX Security 2001 (2001)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: Proc. IEEE Symposium on Security & Privacy, S&P 2007 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-19571-6_16","volume-title":"Theory of Cryptography","author":"D. Boneh","year":"2011","unstructured":"Boneh, D., Sahai, A., Waters, B.: Functional Encryption: Definitions and Challenges. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol.\u00a06597, pp. 253\u2013273. Springer, Heidelberg (2011)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Canetti, R., Hohenberger, S.: Chosen-Ciphertext Secure Proxy Re-Encryption. In: Proc. ACM CCS 2007 (2007)","DOI":"10.1145\/1315245.1315269"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-540-45146-4_33","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"R. Canetti","year":"2003","unstructured":"Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing Chosen-Ciphertext Security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 565\u2013582. Springer, Heidelberg (2003)"},{"key":"15_CR10","unstructured":"Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud Computing (2009), \n                    \n                      http:\/\/www.cloudsecurityalliance.org"},{"key":"15_CR11","unstructured":"European Network and Information Security Agency: Cloud computing risk assessment (November 2009), \n                    \n                      http:\/\/www.enisa.europa.eu\/act\/rm\/_les\/deliverables\/cloud-computing-risk-assessment"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer, Heidelberg (1999)"},{"key":"15_CR13","unstructured":"Gartner: Don\u2019t Trust Cloud Provider to Protect Your Corporate Assets, May 28 (2012), \n                    \n                      http:\/\/www.mis-asia.com\/resource\/cloud-computing\/gartner-dont-trust-cloud-provider-to-protect-your-corporate-assets"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89641-8_1","volume-title":"Cryptology and Network Security","author":"R.H. Deng","year":"2008","unstructured":"Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 1\u201317. Springer, Heidelberg (2008)"},{"key":"15_CR15","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the Decryption of ABE Ciphertexts. In: Proc. USENIX Security 2011 (2011)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandy, O., Sahai, A., Waters, B.: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In: Proc. ACM Computer and Communications Security Conference, CCS 2006 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/978-3-540-70583-3_47","volume-title":"Automata, Languages and Programming","author":"V. Goyal","year":"2008","unstructured":"Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded Ciphertext Policy Attribute Based Encryption. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.\u00a05126, pp. 579\u2013591. Springer, Heidelberg (2008)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-27954-6_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"G. Hanaoka","year":"2012","unstructured":"Hanaoka, G., Kawai, Y., Kunihiro, N., Matsuda, T., Weng, J., Zhang, R., Zhao, Y.: Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol.\u00a07178, pp. 349\u2013364. Springer, Heidelberg (2012)"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-78967-3_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"J. Katz","year":"2008","unstructured":"Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 146\u2013162. Springer, Heidelberg (2008)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute-Based Proxy Ee-encrytpion with Delegating Capabilities. In: Proc. ACM ASIACCS 2009, pp. 276\u2013286 (2009)","DOI":"10.1145\/1533057.1533094"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-642-17650-0_28","volume-title":"Information and Communications Security","author":"S. Luo","year":"2010","unstructured":"Luo, S., Hu, J., Chen, Z.: Ciphertext Policy Attribute-Based Proxy Re-encryption. In: Soriano, M., Qing, S., L\u00f3pez, J. (eds.) ICICS 2010. LNCS, vol.\u00a06476, pp. 401\u2013415. Springer, Heidelberg (2010)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Liang, K., Fang, L., Wong, D.S., Susilo, W.: A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security, IACR Cryptology ePrint Archive (2013)","DOI":"10.1109\/INCoS.2013.103"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-13190-5_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"A. Lewko","year":"2010","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol.\u00a06110, pp. 62\u201391. Springer, Heidelberg (2010)"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-78440-1_21","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"B. Libert","year":"2008","unstructured":"Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 360\u2013379. Springer, Heidelberg (2008)"},{"key":"15_CR25","unstructured":"Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption, \n                    \n                      http:\/\/hal.inria.fr\/inria-00339530\/"},{"issue":"1","key":"15_CR26","first-page":"54","volume":"E80-A","author":"M. Mambo","year":"1997","unstructured":"Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Trans. Fund. Electronics Communications and Computer Science\u00a0E80-A(1), 54\u201363 (1997)","journal-title":"IEICE Trans. Fund. Electronics Communications and Computer Science"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-Based Encryption with Non-monotonic Access Structures. In: Proc. ACM CCS 2007, pp. 195\u2013203 (2007)","DOI":"10.1145\/1315245.1315270"},{"key":"15_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-00468-1_20","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"J. Shao","year":"2009","unstructured":"Shao, J., Cao, Z.: CCA-Secure Proxy Re-encryption without Pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.\u00a05443, pp. 357\u2013376. Springer, Heidelberg (2009)"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-32009-5_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"A. Sahai","year":"2012","unstructured":"Sahai, A., Seyalioglu, H., Waters, B.: Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.\u00a07417, pp. 199\u2013217. Springer, Heidelberg (2012)"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-89754-5_11","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"Q. Tang","year":"2008","unstructured":"Tang, Q.: Type-Based Proxy Re-encryption and Its Construction. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 130\u2013144. Springer, Heidelberg (2008)"},{"key":"15_CR31","unstructured":"Wang, B.: A Unidirectional Conditional Proxy Re-encryption Scheme Based on Non-Monotonic Access Structure. IACR Eprint: eprint.iacr.org\/2012\/641.pdf (2012)"},{"key":"15_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B. Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol.\u00a06571, pp. 53\u201370. Springer, Heidelberg (2011)"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Wang, G., Liu, Q., Wu, J.: Hierarhical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services. In: Proc. ACM CCS 2010 (2010)","DOI":"10.1145\/1866307.1866414"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Weng, J., Deng, R.H., Ding, X., Chu, C.-K., Lai, J.: Conditional Proxy Re-encryption Secure Against Chosen-Ciphertext Attack. In: Proc. of ASIACCS 2009 (2009)","DOI":"10.1145\/1533057.1533100"},{"key":"15_CR35","unstructured":"Weng, J., Chow, S.S.M., Yang, Y., Deng, R.H.: Efficient Unidirectional Proxy Re-Encryption. IACR Eprint: eprint.iacr.org\/2009\/189.pdf (2009)"},{"key":"15_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-04474-8_13","volume-title":"Information Security","author":"J. Weng","year":"2009","unstructured":"Weng, J., Yang, Y., Tang, Q., Deng, R.H., Bao, F.: Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 151\u2013166. Springer, Heidelberg (2009)"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. In: Proc. IEEE INFOCOM 2010 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Zhao, J., Feng, D., Zhang, Z.: Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security. In: Proc. GLOBECOM 2010, pp. 1\u20136 (2010)","DOI":"10.1109\/GLOCOM.2010.5684045"},{"key":"15_CR39","unstructured":"Bibliography on Proxy Re-Cryptography: \n                    \n                      http:\/\/ndc.zjgsu.edu.cn\/~jshao\/prcbib.htm"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12475-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T21:31:00Z","timestamp":1558992660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12475-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319124742","9783319124759"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12475-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}