[PDF][PDF] 基于RLWE 的密文策略属性代理重加密

张恩, 裴瑶瑶, 杜蛟 - Journal on Communication/Tongxin …, 2018 - infocomm-journal.com
针对现有基于LWE 的代理重加密方案存在无法实现细粒度访问及效率低的问题,
结合线性秘密共享方案, RLWE 和属性加密, 提出一种密文策略属性代理重加密方案 …

Identity-based re-encryption scheme with lightweight re-encryption key generation

L Liu, J Ye - Journal of Discrete Mathematical Sciences and …, 2018 - Taylor & Francis
Cryptographic proxy re-encryption is a very useful primitive which is capable of transforming
a ciphertext under one public key PK 1 into a new ciphertext under another public key PK 2 …

Explicit strategy feedback in name-based forwarding

I Solis - US Patent 9,882,964, 2018 - Google Patents
One embodiment provides a system that facilitates explicit strategy feedback in a Content-
Centric Network (CCN). During operation, the system sends a first interest associated with …

Marketplace for presenting advertisements in a scalable data broadcasting system

P Mahadevan, GC Scott, RC Meike - US Patent 9,916,601, 2018 - Google Patents
An ad-marketplace system manages an exchange for advertisement opportunities from a
plurality of content brokers. Each advertising opportunity can include one or more attributes …

[图书][B] Data Service Outsourcing and privacy protection in Mobile internet

H Xiong - 2018 - books.google.com
Mobile internet data has the characteristics of large scale, variety of patterns, and complex
association. On the one hand, it needs an efficient data processing model to provide support …

Secure outsourced calculations with homomorphic encryption

Q Wang, D Zhou, Y Li - arXiv preprint arXiv:1812.00599, 2018 - arxiv.org
With the rapid development of cloud computing, the privacy security incidents occur
frequently, especially data security issues. Cloud users would like to upload their sensitive …

Universal proxy re-encryption

N Döttling, R Nishimaki - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We put forward the notion of universal proxy re-encryption (UPRE). A UPRE scheme
enables a proxy to convert a ciphertext under a (delegator) public key of any existing public …

Method and apparatus for streaming advertisements in a scalable data broadcasting system

P Mahadevan, GC Scott, RC Meike - US Patent 10,089,651, 2018 - Google Patents
A content broker can receive a request from a user's client device for access to a data
stream, and determines whether the client device has a sufficient number of credits to …

A proxy re-encryption-based webmail and file sharing system for collaboration in cloud computing environment

BS Rawal - 2018 International Conference on Computational …, 2018 - ieeexplore.ieee.org
Most email users are still using the same email address set up fifteen years ago. Attained
from their Internet service provider or having a free email account provided by Yahoo, Gmail …

CCA secure proxy re-encryption scheme for secure sharing of files through cloud storage

B Mishra, D Jena - 2018 Fifth International Conference on …, 2018 - ieeexplore.ieee.org
Cloud Storage Service (CSS) provides unbounded, robust file storage capability and
facilitates for pay-per-use and collaborative work to end users. But due to security issues like …