{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:57:20Z","timestamp":1725868640876},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_38","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"405-413","source":"Crossref","is-referenced-by-count":0,"title":["On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing"],"prefix":"10.1007","author":[{"given":"Jindan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Baocang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"38_CR1","unstructured":"G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In NDSS(2005), pages 29\u201343."},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In ACM Transation Information System Security 9 (2006), no. 1, pages 1\u201330.","DOI":"10.1145\/1127345.1127346"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"M. Blaze, G. Bleumer and M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. In Advances in Cryptology - Eurocrypt\u201998, LNCS 1403, pp. 127\u2013144. Springer\u2013Verlag, 1998.","DOI":"10.1007\/BFb0054122"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"R. Canetti and S. Hohenberger, Chosen Ciphertext Secure Proxy Re-encryption. In ACM CCS 2007, pp. 185\u2013194.2007.","DOI":"10.1145\/1315245.1315269"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"R. Deng, J.Weng, S. Liu and K. Chen. Chosen Ciphertext Secure Proxy Re-encryption without Pairing. In CANS\u201908, LNCS 5339, pp.1-17, Springer-Verlag, 2008.","DOI":"10.1007\/978-3-540-89641-8_1"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"M. Green and G. Ateniese. Identity-based proxy re-encryption. In ACNS 2007, volume 4521 of LNCS, pages 288\u2013306, 2007.","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In PKC 2008, LNCS 4939, pages 360\u2013379, Springer\u2013Verlag, 2008.","DOI":"10.1007\/978-3-540-78440-1_21"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption. In IEEE Transactions on Information Theory, vol. 57, No. 3, pages 1786\u20131802, 2011.","DOI":"10.1109\/TIT.2011.2104470"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"K. Liang, W. Susilo, J. K. Liu. Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. In IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, pages 1578\u20131589, 2015.","DOI":"10.1109\/TIFS.2015.2419186"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, T. Phuong, Q. Xie. A DFABased Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. In IEEE Transactions on Information Forensics and Security, Vol. 9, No. 10, pages 1667\u20131680, 2014.","DOI":"10.1109\/TIFS.2014.2346023"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"K. Liang, W. Susilo. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. In IEEE Transactions on Information Forensics and Security, Vol. 10, No. 9, pages 1981\u20131992, 2015.","DOI":"10.1109\/TIFS.2015.2442215"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"J. Shao and Z. Cao. CCA-secure proxy re-encryption without pairing. In PKC 2009, LNCS 5443, pages. 357\u2013376, Springer\u2013Verlag, 2009.","DOI":"10.1007\/978-3-642-00468-1_20"},{"key":"38_CR13","unstructured":"J. Shao, Z. Cao, P. Lin. Generic construction for CCA-secure unidirectional proxy reencryption. In Security and Communication Networks, no. 2, pages 1-16, 2009."},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"J. Weng, R. H. Deng, C. Chu, X. Ding, and J. Lai. Conditional proxy re-encryption secure against chosen-ciphertext attack. In ACM ASIACCS 2009, pages 322\u2013332, 2009.","DOI":"10.1145\/1533057.1533100"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"J. Weng, Y. Yang, Q. Tang, R. Deng, and F. Bao. Efficient conditional proxy re-encryption with chosen-ciphertext security. In ISC 2009, volume 5735 of LNCS, pages 151\u2013166, 2009.","DOI":"10.1007\/978-3-642-04474-8_13"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"J. Weng, Y. Zhao, G. Hanaoka. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. In PKC 2011, pages 284-295, 2011.","DOI":"10.1007\/978-3-642-19379-8_18"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"J. Weng, M. Chen, Y. Yang, R. Deng, K. Chen and F. Bao CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. In Science China Information Sciences, 53, : 593-606, 2010.","DOI":"10.1007\/s11432-010-0047-3"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"S. Chow, J. Weng, Y. Yang, R. Deng Efficient unidirectional proxy re-encryption. In AFRICACRYPT 2010, volume 6055 of LNCS, pages 316\u2013332, 2010.","DOI":"10.1007\/978-3-642-12678-9_19"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:01:00Z","timestamp":1568484060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_38","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}