Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Won-Bin-
dc.contributor.authorKim, Su-Hyun-
dc.contributor.authorSeo, Daehee-
dc.contributor.authorLee, Im-Yeong-
dc.date.accessioned2022-07-21T01:40:27Z-
dc.date.available2022-07-21T01:40:27Z-
dc.date.issued2022-06-
dc.identifier.issn1530-8669-
dc.identifier.issn1530-8677-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/21224-
dc.description.abstractProxy reencryption delegates encrypted data stored in a proxy to a third party. This proxy reencryption takes the form of one sender providing data to one receiver. However, this method incurs a significant overhead for both the sender and proxy as the number of users receiving the same data increases. In addition, in a large-scale environment, such as an Internet of Things or big data environment, a scenario where several workers jointly create and own an output may exist. In such an environment, ownership disputes can arise when only one operator owns a piece data used by other operators. In this study, to solve this problem, we propose a technique in which multiple users can jointly own one piece of data, and multiple recipients can receive the same data through proxy reencryption.-
dc.format.extent17-
dc.language영어-
dc.language.isoENG-
dc.publisherJohn Wiley & Sons Inc.-
dc.titleCertificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1155/2022/1903197-
dc.identifier.scopusid2-s2.0-85133970699-
dc.identifier.wosid000826052800003-
dc.identifier.bibliographicCitationWireless Communications and Mobile Computing, v.2022, no.0, pp 1 - 17-
dc.citation.titleWireless Communications and Mobile Computing-
dc.citation.volume2022-
dc.citation.number0-
dc.citation.startPage1-
dc.citation.endPage17-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusRE-ENCRYPTION-
dc.subject.keywordPlusMULTIRECEIVER ENCRYPTION-
dc.subject.keywordPlusSCHEME-
dc.subject.keywordPlusPROTOCOL-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Im Yeong photo

Lee, Im Yeong
College of Software Convergence (Department of Computer Software Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE