ZigBee Security Using Attribute-Based Proxy Re-encryption

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ZigBee Security Using Attribute-Based Proxy Re-encryption

ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy reencryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attribut...

متن کامل

Attribute-Based Proxy Re-Encryption with Keyword Search

Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising feature: In addition to supporting keywo...

متن کامل

On the Security of Group-based Proxy Re-encryption Scheme

Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext intended for Alice into a ciphertext for Bob without learning anything about the underlying plaintext. Chunbo Ma et al. have proposed a group based proxy re-encryption scheme to convert a ciphertext from one group to another. Any group member can independently decrypt the ciphertexts encrypted to its group. In their p...

متن کامل

Identity-Based Proxy Re-encryption

In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with curr...

متن کامل

Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes

In Ciphertext Policy Attribute Based Encryption (CPABE) scheme, a user’s private key is associated with a set of attributes, and the sensitive data are encrypted under an access structure over attributes, only if the users whose attributes satisfy the access structure associated with the ciphertext can decrypt the ciphertext data. However, a limitation of the existing CP-ABE schemes is that it ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of information and communication convergence engineering

سال: 2012

ISSN: 2234-8255

DOI: 10.6109/jicce.2012.10.4.343