Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "50777408-df5d-4b79-94b1-2f31248acee1"}, "_deposit": {"id": "4892", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4892"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4892", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Non-Transferable Proxy Re-Encryption for Group Membership/ Non- Group Membership", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In proxy re-encryption (PRE) scheme themessage is sent by a delegator to a delegatee with ahelp of the trusted third party proxy without knowingthe existing plaintext. PRE schemes are widely usedin various applications. However, the standard PREscheme has some proxy problems called private keygenerator (PKG) despotism problem. This means thatPKG can make re-encryption key without gettingpermission from the delegator. And also, most of thePRE schemes have the key-escrow problem. Ifsomeone can attack PKG in PRE scheme, they candecrypt both the original ciphertext and the reencryptedciphertext which means the key-escrowproblem. A solution for these two problems is to usenon-transferable PRE scheme. Non-transferable PREscheme solved the above PKG despotism problemand key-escrow problem. We would like to introduceour PRE scheme with a new approach. In ourscheme, there are three sub-processes, which arebased on non-transferable PRE scheme and groupsignature. Our scheme will provide the security fordelegator i, delegatee j (who is in the same groupwith delegator i), and delegatee k (who is in adifferent group from delegator i)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "proceeding_total-pages-321-327.pdf", "filesize": [{"value": "3407 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 3407000.0, "url": {"url": "https://meral.edu.mm/record/4892/files/proceeding_total-pages-321-327.pdf"}, "version_id": "e850b425-f3f3-4d00-8987-66cce7a8acbc"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifteenth International Conference on Computer Applications(ICCA 2017)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "San, Lwin"}, {"subitem_authors_fullname": "Cho, Ei Mon"}, {"subitem_authors_fullname": "Koshiba, Takeshi"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-02-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/792"}, "item_title": "Non-Transferable Proxy Re-Encryption for Group Membership/ Non- Group Membership", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004892", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4892", "relation": {}, "relation_version_is_last": true, "title": ["Non-Transferable Proxy Re-Encryption for Group Membership/ Non- Group Membership"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Non-Transferable Proxy Re-Encryption for Group Membership/ Non- Group Membership

http://hdl.handle.net/20.500.12678/0000004892
http://hdl.handle.net/20.500.12678/0000004892
f3125065-dead-48c3-8c85-a9864087b88c
50777408-df5d-4b79-94b1-2f31248acee1
None
Preview
Name / File License Actions
proceeding_total-pages-321-327.pdf proceeding_total-pages-321-327.pdf (3407 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:27:59.806823
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL