Offline privacy preserving proxy re-encryption in mobile cloud computing

Pervasive and Mobile Computing 59 (2019)
  Copy   BIBTEX

Abstract

This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing.

Analytics

Added to PP
2020-07-12

Downloads
449 (#34,049)

6 months
80 (#46,951)

Historical graph of downloads since first upload
This graph includes both downloads from PhilArchive and clicks on external links on PhilPapers.
How can I increase my downloads?