{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:41:13Z","timestamp":1725892873904},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040696"},{"type":"electronic","value":"9783642040702"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04070-2_108","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T14:47:18Z","timestamp":1252939638000},"page":"1025-1034","source":"Crossref","is-referenced-by-count":3,"title":["Group-Based Proxy Re-encryption Scheme"],"prefix":"10.1007","author":[{"given":"Chunbo","family":"Ma","sequence":"first","affiliation":[]},{"given":"Jun","family":"Ao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"108_CR1","unstructured":"Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Trans. Fund. Electronics Communications and Computer Science E80-A\/1, 54\u201363 (1997)"},{"key":"108_CR2","unstructured":"Ivan, A., Dodis, Y.: Proxy Cryptography Revisited. In: Proceedings of the Tenth Network and Distributed System Security Symposium (February 2003)"},{"key":"108_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 127\u2013144. Springer, Heidelberg (1998); Ateniese, G., Fu, K., Green, M., Honhenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In: Proceedings of NDSS, pp. 29-43 (2005)"},{"issue":"1","key":"108_CR4","first-page":"63","volume":"3","author":"C. Ma","year":"2007","unstructured":"Ma, C., Mei, Q., Li, J.: Broadcast Group-oriented Encryption for Group Communication. Journal of Computational Information Systems\u00a03(1), 63\u201371 (2007)","journal-title":"Journal of Computational Information Systems"},{"key":"108_CR5","unstructured":"Canetti, R., Hohenberger, S.: Chosen-Ciphertext Secure Proxy Re-Encryption (2007), \n                    \n                      http:\/\/eprint.iacr.org\/2007\/171"},{"key":"108_CR6","doi-asserted-by":"crossref","unstructured":"Jakobsson, M.: On Quorum Controlled Asymmetric Proxy Re-encryption. In: Proceedings of Public Key Cryptography, pp. 112\u2013121 (1999)","DOI":"10.1007\/3-540-49162-7_9"},{"key":"108_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-72738-5_19","volume-title":"Applied Cryptography and Network Security","author":"M. Green","year":"2007","unstructured":"Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 288\u2013306. Springer, Heidelberg (2007)"},{"key":"108_CR8","unstructured":"Kim, H., Baek, J., Lee, B., Kim, K.: Computing with Secrets for Mobile Agent Using One-time Proxy Signature. In: Proceedings of SCIS 2001, vol.\u00a02(2), pp. 845\u2013850 (2001)"},{"key":"108_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-44647-8_8","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"P.D. MacKenzie","year":"2001","unstructured":"MacKenzie, P.D., Reiter, M.K.: Two-party generation of DSA signatures. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 137\u2013154. Springer, Heidelberg (2001)"},{"key":"108_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"108_CR11","doi-asserted-by":"crossref","unstructured":"Blaze. M.: A Cryptographic File System for Unix. In: First ACM Conference on Communications and Computing Security, Fairfax, VA (November 1993)","DOI":"10.1145\/168588.168590"},{"key":"108_CR12","unstructured":"Freeman, W., Miller, E.: Design for a Decentralized Security System for Network-attached Storage. In: Proceedings of the 17th IEEE Symposium on Mass Storage Systems and Technologies, College Park, MD, March 2000, pp. 361\u2013373 (2000)"},{"key":"108_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 223\u2013238. Springer, Heidelberg (2004)"},{"key":"108_CR14","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences\u00a028, 270\u2013299 (1984)","journal-title":"Journal of Computer and System Sciences"},{"key":"108_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/3-540-46766-1_35","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"C. Rackoff","year":"1992","unstructured":"Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 433\u2013444. Springer, Heidelberg (1992)"},{"key":"108_CR16","doi-asserted-by":"crossref","unstructured":"Phan, T., Huan, L., Dulan, C.: Challenge: Integrating Mobile Wireless Devices into the Computational Grid. In: Proceedings of MobiCom, pp. 271\u2013278 (2002)","DOI":"10.1145\/570645.570679"},{"key":"108_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-78440-1_21","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"B. Libert","year":"2008","unstructured":"Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 360\u2013379. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Emerging Intelligent Computing Technology and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04070-2_108.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T06:55:45Z","timestamp":1619765745000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04070-2_108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040696","9783642040702"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04070-2_108","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}