Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014, Article ID 329198, 7 pages
Research Article

Time-and-ID-Based Proxy Reencryption Scheme

1Department of IT Convergence and Engineering, Kyungil University, Daegu 712-701, Republic of Korea
2School of Computer Science and Engineering, Kyungpook National University, Daegu 702-701, Republic of Korea
3Department of Multimedia, Sungkyul University, Anyang-si 430-742, Republic of Korea

Received 28 December 2013; Accepted 4 February 2014; Published 22 May 2014

Academic Editor: Jongsung Kim

Copyright © 2014 Kambombo Mtonga et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [4 citations]

The following is the list of published articles that have cited the current article.

  • Sohail Jabbar, Abid Ali Minhas, Moneeb Gohar, Anand Paul, and Seungmin Rho, “E-MCDA: Extended-Multilayer Cluster Designing Algorithm for Network Lifetime Improvement of Homogenous Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–21, 2015. View at Publisher · View at Google Scholar
  • Feng Shao, Shun Zhang, Run-Hua Shi, Hong Zhong, and Jie Cui, “Keyword search protocol with privacy preservation using ID-based proxy reencryption,” International Journal of Security and Networks, vol. 11, no. 4, pp. 188–195, 2016. View at Publisher · View at Google Scholar
  • Kambombo Mtonga, Eun Jun Yoon, and Hyun Sung Kim, “Authenticated Privacy Preserving Pairing-Based Scheme for Remote Health Monitoring Systems,” Journal of Information Security, vol. 08, no. 01, pp. 75–90, 2017. View at Publisher · View at Google Scholar
  • Jianhong Zhang, Wenle Bai, and Xianmin Wang, “Identity-based data storage scheme with anonymous key generation in fog computing,” Soft Computing, 2018. View at Publisher · View at Google Scholar