{"created":"2020-09-01T15:27:57.922187+00:00","id":4892,"links":{},"metadata":{"_buckets":{"deposit":"50777408-df5d-4b79-94b1-2f31248acee1"},"_deposit":{"id":"4892","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4892"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4892","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Non-Transferable Proxy Re-Encryption for Group Membership/ Non- Group Membership","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"In proxy re-encryption (PRE) scheme themessage is sent by a delegator to a delegatee with ahelp of the trusted third party proxy without knowingthe existing plaintext. PRE schemes are widely usedin various applications. However, the standard PREscheme has some proxy problems called private keygenerator (PKG) despotism problem. This means thatPKG can make re-encryption key without gettingpermission from the delegator. And also, most of thePRE schemes have the key-escrow problem. Ifsomeone can attack PKG in PRE scheme, they candecrypt both the original ciphertext and the reencryptedciphertext which means the key-escrowproblem. A solution for these two problems is to usenon-transferable PRE scheme. Non-transferable PREscheme solved the above PKG despotism problemand key-escrow problem. We would like to introduceour PRE scheme with a new approach. In ourscheme, there are three sub-processes, which arebased on non-transferable PRE scheme and groupsignature. Our scheme will provide the security fordelegator i, delegatee j (who is in the same groupwith delegator i), and delegatee k (who is in adifferent group from delegator i)."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-12"}],"displaytype":"preview","filename":"proceeding_total-pages-321-327.pdf","filesize":[{"value":"3407 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4892/files/proceeding_total-pages-321-327.pdf"},"version_id":"e850b425-f3f3-4d00-8987-66cce7a8acbc"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifteenth International Conference on Computer Applications(ICCA 2017)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"San, Lwin"},{"subitem_authors_fullname":"Cho, Ei Mon"},{"subitem_authors_fullname":"Koshiba, Takeshi"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2017-02-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/792"},"item_title":"Non-Transferable Proxy Re-Encryption for Group Membership/ Non- Group Membership","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-12","publish_status":"0","recid":"4892","relation_version_is_last":true,"title":["Non-Transferable Proxy Re-Encryption for Group Membership/ Non- Group Membership"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:15:32.032770+00:00"}