A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Improved anonymous proxy re-encryption with CCA security
2014
Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14
Outsourcing private data and heavy computation tasks to the cloud may lead to privacy breach as attackers (e.g., malicious outsiders or cloud administrators) may correlate any relevant information to penetrate information of their interests. Therefore, how to preserve cloud users' privacy has been a top concern when adopting cloud solutions. In this paper, we investigate the identity privacy problem for the proxy re-encryption, which allows any third party (e.g., cloud) to re-encrypt
doi:10.1145/2590296.2590322
dblp:conf/ccs/ZhengZZZ14
fatcat:mf4tupv4w5bxbhn5zakv6xtp7u