{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:28:54Z","timestamp":1740202134555,"version":"3.37.3"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,6]]},"DOI":"10.1109\/comsnets63942.2025.10885766","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:05:58Z","timestamp":1740081958000},"page":"1329-1334","source":"Crossref","is-referenced-by-count":0,"title":["Efficient privacy enabled data sharing in cloud using a novel Homomorphic Proxy Re-Encryption Scheme"],"prefix":"10.1109","author":[{"given":"Imtiyazuddin","family":"Shaik","sequence":"first","affiliation":[{"name":"CyberSecurity and Privacy TCS Research,Hyderabad,India"}]},{"given":"Arinjita","family":"Paul","sequence":"additional","affiliation":[{"name":"Cryptography Niobium Microsystems,New Tork,USA"}]},{"given":"Rajan M","family":"A","sequence":"additional","affiliation":[{"name":"CyberSecurity and Privacy TCS Research,Bangalore,India"}]},{"given":"Divyesh","family":"Saglani","sequence":"additional","affiliation":[{"name":"CyberSecurity and Privacy TCS Research,Pune,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12678-9_19"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s21010288"},{"issue":"11","key":"ref4","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Foundations of secure computation"},{"volume-title":"A fully homomorphic encryption scheme.","year":"2009","author":"Gentry","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854089"},{"issue":"1","key":"ref11","first-page":"54","article-title":"Proxy cryptosystems: Delegation of the power to decrypt ciphertexts","volume":"80","author":"Mambo","year":"1997","journal-title":"IEICE transactions on fundamentals of electronics, Communications and computer sciences"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref14","first-page":"185","article-title":"Chosen-ciphertext secure proxy reencryption","volume-title":"Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007","author":"Canetti"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2104470"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87101-7_4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78086-9_7"},{"article-title":"Privacy-Enhancing Cryptography to Complement Differential Privacy","year":"2021","author":"Brandao","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77287-1_2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"article-title":"Proxy cryptography revisited","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, San Diego, California, USA","author":"Ivan","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714585"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E98.A.100"},{"key":"ref25","first-page":"278","article-title":"Various proxy re-encryption schemes from lattices","author":"Fan","year":"2016","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref28","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47422-9_21"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2740720"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134616"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533100"}],"event":{"name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","start":{"date-parts":[[2025,1,6]]},"location":"Bengaluru, India","end":{"date-parts":[[2025,1,10]]}},"container-title":["2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10885406\/10885547\/10885766.pdf?arnumber=10885766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:54:12Z","timestamp":1740138852000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10885766\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/comsnets63942.2025.10885766","relation":{},"subject":[],"published":{"date-parts":[[2025,1,6]]}}}