References
Li Z P, Ma C G, Wang D. Achieving multi-hop PRE via branching program. IEEE Trans Cloud Comput, 2020, 8: 45–58
Li Z P, Ma C G, Wang D. Towards multi-hop homomorphic identity-based proxy re-encryption via branching program. IEEE Access, 2017, 5: 16214–16228
Li Z P, Ma C G, Wang D, et al. Toward proxy re-encryption from learning with errors in the exponent. In: Proceedings of Trust Security and Privacy in Computing and Communications, 2017. 683–690
Ge C P, Susilo W, Fang L, et al. A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Des Codes Cryptogr, 2018, 86: 2587–2603
Boneh D, Waters B. Constrained pseudorandom functions and their applications. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2013. 280–300
Kiayias A, Papadopoulos S, Triandopoulos N, et al. Delegatable pseudorandom functions and applications. In: Proceedings of Computer and Communications Security, 2013. 669–684
Boyle E, Goldwasser S, Ivan I. Functional signatures and pseudorandom functions. In: Proceedings of Public Key Cryptography, 2014. 501–519
Banerjee A, Fuchsbauer G, Peikert C, et al. Keyhomomorphic constrained pseudorandom functions. In: Proceedings of Theory of Cryptography Conference, 2015. 31–60
Boneh D, Gennaro R, Goldfeder S, et al. Threshold cryptosystems from threshold fully homomorphic encryption. In: Proceedings of International Cryptology Conference, 2018. 565–596
Acknowledgements
This work was supported in part by National Natural Science Foundation of China (Grant No. 61802214), National Natural Science Foundation of Shandong Province, China (Grant No. ZR2019BF009), Applied Fundamental Research Project of Qingdao (Grant No. 19-6-2-6-cg), and Foundation of Guizhou Provincial Key Laboratory of Public Big Data (Grant No. 2019BDKFJJ007).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Li, Z., Sharma, V., Ma, C. et al. Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs. Sci. China Inf. Sci. 64, 169301 (2021). https://doi.org/10.1007/s11432-019-2856-8
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-2856-8