{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:22:05Z","timestamp":1725906125477},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319641997"},{"type":"electronic","value":"9783319642000"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64200-0_6","type":"book-chapter","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T12:58:41Z","timestamp":1501073921000},"page":"85-101","source":"Crossref","is-referenced-by-count":3,"title":["Secure Certificateless Proxy Re-encryption Without Pairing"],"prefix":"10.1007","author":[{"given":"Veronika","family":"Kuchta","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Rajeev Anand","family":"Sahu","sequence":"additional","affiliation":[]},{"given":"Tarunpreet","family":"Bhatia","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Markowitch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,27]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 452\u2013473. Springer (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"issue":"1","key":"6_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Kevin, F., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inform. Syst. Secur. (TISSEC) 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inform. Syst. Secur. (TISSEC)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/11556992_10","volume-title":"Information Security","author":"J Baek","year":"2005","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134\u2013148. Springer, Heidelberg (2005). doi: 10.1007\/11556992_10"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998). doi: 10.1007\/BFb0054122"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 185\u2013194. ACM (2007)","DOI":"10.1145\/1315245.1315269"},{"issue":"15","key":"6_CR6","doi-asserted-by":"crossref","first-page":"2895","DOI":"10.1016\/j.ins.2010.04.002","volume":"180","author":"X Cao","year":"2010","unstructured":"Cao, X., Kou, W., Xiaoni, D.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895\u20132903 (2010)","journal-title":"Inf. Sci."},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-12678-9_19","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"SSM Chow","year":"2010","unstructured":"Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316\u2013332. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-12678-9_19"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-540-75496-1_13","volume-title":"Information Security","author":"C-K Chu","year":"2007","unstructured":"Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189\u2013202. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-75496-1_13"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Debiao, H., Jianhua, C, Jin, H.: An id-based proxy signature schemes without bilinear pairings. annals of telecommunications-annales des t\u00e9l\u00e9communications 66(11\u201312), 657\u2013662 (2011)","DOI":"10.1007\/s12243-011-0244-0"},{"key":"6_CR10","unstructured":"Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptographic protocols: A survey. IACR Cryptology ePrint Archive 2004, 64 (2004)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-72738-5_19","volume-title":"Applied Cryptography and Network Security","author":"M Green","year":"2007","unstructured":"Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288\u2013306. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-72738-5_19"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-642-41227-1_19","volume-title":"Provable Security","author":"H Guo","year":"2013","unstructured":"Guo, H., Zhang, Z., Zhang, J., Chen, C.: Towards a secure certificateless proxy re-encryption scheme. In: Susilo, W., Reyhanitabar, R. (eds.) ProvSec 2013. LNCS, vol. 8209, pp. 330\u2013346. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-41227-1_19"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11957454_1","volume-title":"Privacy Enhancing Technologies","author":"TS Heydt-Benjamin","year":"2006","unstructured":"Heydt-Benjamin, T.S., Chae, H.-J., Defend, B., Fu, K.: Privacy for public transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 1\u201319. Springer, Heidelberg (2006). doi: 10.1007\/11957454_1"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-11203-9_15","volume-title":"Computer Security - ESORICS 2014","author":"K Liang","year":"2014","unstructured":"Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 257\u2013272. Springer, Cham (2014). doi: 10.1007\/978-3-319-11203-9_15"},{"key":"6_CR15","unstructured":"Liang, K., Susilo, W., Liu, J.K., Wong, D.S.: Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption. Comput. J. 58, 2778\u20132792 (2015)"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-78440-1_21","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"B Libert","year":"2008","unstructured":"Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360\u2013379. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-78440-1_21"},{"key":"6_CR17","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.future.2015.11.012","volume":"62","author":"Y Lu","year":"2016","unstructured":"Lu, Y., Li, J.: A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst. 62, 140\u2013147 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"6_CR18","unstructured":"MIRACL. Multiprecision integer and rational arithmetic cryptographic library. http:\/\/certivox.org\/display\/EXT\/MIRACL"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-319-22047-5_17","volume-title":"Big Data Computing and Communications","author":"Z Qin","year":"2015","unstructured":"Qin, Z., Wu, S., Xiong, H.: Strongly secure and cost-effective certificateless proxy re-encryption scheme for data sharing in cloud computing. In: Wang, Y., Xiong, H., Argamon, S., Li, X.Y., Li, J.Z. (eds.) BigCom 2015. LNCS, vol. 9196, pp. 205\u2013216. Springer, Cham (2015). doi: 10.1007\/978-3-319-22047-5_17"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-00468-1_20","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"J Shao","year":"2009","unstructured":"Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 357\u2013376. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-00468-1_20"},{"key":"6_CR21","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.ins.2012.04.013","volume":"206","author":"J Shao","year":"2012","unstructured":"Shao, J., Cao, Z.: Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Inf. Sci. 206, 83\u201395 (2012)","journal-title":"Inf. Sci."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Srinivasan, A., Pandu Rangan, C.: Certificateless proxy re-encryption without pairing. IACR Cryptology ePrint Archive, 2014:933 (2014)","DOI":"10.1145\/2732516.2732519"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-13241-4_20","volume-title":"Communications and Multimedia Security","author":"C Sur","year":"2010","unstructured":"Sur, C., Jung, C.D., Park, Y., Rhee, K.H.: Chosen-ciphertext secure certificateless proxy re-encryption. In: Decker, B., Schaum\u00fcller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 214\u2013232. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13241-4_20"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-17455-1_21","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"L Wang","year":"2010","unstructured":"Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity-based proxy re-encryption schemes to prevent collusion attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327\u2013346. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-17455-1_21"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Xu, L., Wu, X., Zhang, X.: Cl-pre: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87\u201388. ACM (2012)","DOI":"10.1145\/2414456.2414507"},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-12160-4_5","volume-title":"Information Security and Cryptology \u2013 ICISC 2013","author":"K Yang","year":"2014","unstructured":"Yang, K., Xu, J., Zhang, Z.: Certificateless proxy re-encryption without pairings. In: Lee, H.-S., Han, D.-G. (eds.) ICISC 2013. LNCS, vol. 8565, pp. 67\u201388. Springer, Cham (2014). doi: 10.1007\/978-3-319-12160-4_5"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64200-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T16:37:51Z","timestamp":1569947871000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64200-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319641997","9783319642000"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64200-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}