Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Won-Bin | - |
dc.contributor.author | Kim, Su-Hyun | - |
dc.contributor.author | Seo, Daehee | - |
dc.contributor.author | Lee, Im-Yeong | - |
dc.date.accessioned | 2022-07-21T01:40:27Z | - |
dc.date.available | 2022-07-21T01:40:27Z | - |
dc.date.issued | 2022-06 | - |
dc.identifier.issn | 1530-8669 | - |
dc.identifier.issn | 1530-8677 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/21224 | - |
dc.description.abstract | Proxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increases. In addition, in a large-scale environment, such as an Internet of Things or big data environment, a scenario where several workers jointly create and own an output may exist. In such an environment, ownership disputes can arise when only one operator owns a piece data used by other operators. In this study, to solve this problem, we propose a technique in which multiple users can jointly own one piece of data, and multiple recipients can receive the same data through proxy reencryption. | - |
dc.format.extent | 17 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | John Wiley & Sons Inc. | - |
dc.title | Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs | - |
dc.type | Article | - |
dc.publisher.location | 영국 | - |
dc.identifier.doi | 10.1155/2022/1903197 | - |
dc.identifier.scopusid | 2-s2.0-85133970699 | - |
dc.identifier.wosid | 000826052800003 | - |
dc.identifier.bibliographicCitation | Wireless Communications and Mobile Computing, v.2022, no.0, pp 1 - 17 | - |
dc.citation.title | Wireless Communications and Mobile Computing | - |
dc.citation.volume | 2022 | - |
dc.citation.number | 0 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 17 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | RE-ENCRYPTION | - |
dc.subject.keywordPlus | MULTIRECEIVER ENCRYPTION | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordPlus | PROTOCOL | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.