{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T11:37:51Z","timestamp":1648899471086},"reference-count":28,"publisher":"International Academy Publishing (IAP)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.3.617-626","type":"journal-article","created":{"date-parts":[[2013,3,6]],"date-time":"2013-03-06T23:03:26Z","timestamp":1362611006000},"source":"Crossref","is-referenced-by-count":0,"title":["DDos Attack against Proxy in PRE and PRS"],"prefix":"10.17706","volume":"8","author":[{"given":"Jindan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,3,1]]},"reference":[{"key":"ref1","volume-title":"Distributed blinding for ElGamal re-encryption TR 1924","author":"Zhou","year":"2004","unstructured":"[5]L. Zhou, M. A. Marsh, F. B. Schneider and A. Redz. Distributed blinding for ElGamal re-encryption. TR 1924, Cornell CS Dept., 2004."},{"key":"ref2","first-page":"310","article-title":"Proxy re-signatures: new definitions, algorithms, and applications.","volume-title":"ACM CCS 2005","author":"Ateniese","year":"2005","unstructured":"[7]G. Ateniese, S. Hohenberger. Proxy re-signatures: new definitions, algorithms, and applications. In ACM CCS 2005}, pp. 310--319. ACM Press,2005."},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1145\/1455770.1455835","article-title":"Multi-Use Unidirectional Proxy Re-Signatures.","volume-title":"CCS 2008","author":"Libert","year":"2008","unstructured":"[24]B. Libert and D. Vergnaud. Multi-Use Unidirectional Proxy Re-Signatures. In CCS 2008, ACM Press, 2008."},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[1]R. Cramer and V. Shoup. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In Crypto 1998, LNCS 1462, pp.13--25. Springer Verlag,1998.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[2]M. Blaze, G. Bleumer and M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. In Eurocrypt 1998, LNCS 1403, pp.127--144. Springer--Verlag, 1998.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[3]M. Jakobsson. On quorum controlled asymmetric proxy re-encryption. In PKC 1999, pages 112--121, Springer--Verlag, 1999.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[4]Y. Dodis and A.Ivan. Proxy cryptography revisited. In NDSS2003, 2003.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[6]G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In ACM Transaction Information System Security. Vol 9 (2006), no. 1, pages 1--30.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[8]S. Hohenberger. Advances in Signatures, Encryption, and E-Cash from Bilinear Groups. Ph.D. Thesis, MIT, May 2006.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[9]E. Goh,and T. Matsuo. Proposal for P1363.3 Proxy Re-encryption. http:\/\/grouper.ieee.org\/groups\/1363\/IBC\/submissions.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[10]M. Barbosa, L. Chen, Z. Cheng et al. K-KEM:An Identity-based Kem. http:\/\/grouper.ieee.org\/groups\/1363\/IBC\/submissions.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[11]R. Canetti and S. Hohenberger. Chosen Ciphertext Secure Proxy Re-encryption. In CCS 2007, pp. 185--194. 2007. Also available at Cryptology ePrint Archive: http:\/\/eprint.iacr.org\/2007\/171.pdf.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[12]S. Hohenberger, G. N. Rothblum, a. shelat, V. Vaikuntanathan. Securely Obfuscating Re-encryption. In TCC 2007, LNCS 4392, pp. 233--252. Springer--Verlag, 2007.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[13]J. Shao, Z. Cao, L. Wang, X. Liang. Proxy Re-Signature Schemes without Random Oracles. In Indocrypt 2007, LNCS 4859, pp. 197--209. Springer--Verlag, 2007.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[14]M. Green and G. Ateniese. Identity-Based Proxy Re-encryption. In ACNS 2007, LNCS 4521, pp. 288--306. Springer--Verlag,2007.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[15]T. Matsuo. Proxy Re-encryption Systems for Identity-Based Encryption. In Pairing 2007, LNCS 4575, pp. 247--267. Springer--Verlag,2007.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[16]C. Chu and W. Tzeng. Identity-based proxy re-encryption without random oracles. In ISC 2007, LNCS 4779, pp. 189--202. Springer--Verlag, 2007.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[17]J. Shao, D. Xing and Z. Cao. Identity-Based Proxy Rencryption Schemes with Multiuse, Unidirection, and CCA Security. Cryptography ePrent Achieve.http:\/\/eprint.iacr.org\/2008\/103.pdf,2008.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[18]V. Kirtane, C. Rangan. RSA-TBOS Signcryption with Proxy Re-encryption. http:\/\/eprint.iacr.org\/2008\/324.pdf,2008.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[19]S. Chandrasekar, K. Ambika, Rangan C. Signcryption with Proxy Re-encryption.http:\/\/eprint.iacr.org\/2008\/276.pdf, 2008.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[20]C. Ma, J. Ao and J. Li. Group-oriented encryption secure against collude attack. http:\/\/eprint.iacr.org\/2007\/371.pdf, 2007.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[21]C. Ma, J. Ao. Revisit of Group-based Unidirectional Proxy Re-encryption Scheme. http:\/\/eprint.iacr.org\/2008\/325.pdf,2008.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[22]B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In PKC 2008, LNCS 4939, pp. 360--379. Springer--Verlag, 2008.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[23]B. Libert and D. Vergnaud. Tracing Malicious Proxies in Proxy Re-Encryption. In Pairing 2008, Springer--Verlag, 2008.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[25]X. Wang and X. Yang. On DDos attack against proxy in proxy re-encryption and proxy re-signature. IEEE ninth international conference on computer and information technology (CIT 2009), IEEE computer society, 2009. Vol 2, pp. 213-219.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[26]X. Hong, Y. Long. A novel unidirectional proxy re-Signature scheme and its application for MANETs. In Journal of Computers, pp. 1796-1800. Vol. 7 No. 7, 2012.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[27]Y. Deng, S. Ge. Proxy re-signature scheme based on quadratic residues, In Journal of Softare, pp. 1459-1465. Vol. 6, Num. 10, 2011.","DOI":"10.1145\/1455770.1455835"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"[28]T. Chen, H. Yu. Bilinear parings in property-based attestation. In Journal of Computers, pp. 297-304, Vol. 6, Num. 2, 2011.","DOI":"10.1145\/1455770.1455835"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T08:54:17Z","timestamp":1498035257000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/8662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,1]]},"references-count":28,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2013,3,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.3.617-626","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,3,1]]}}}