REFERENCES
Ateniese, G., Benson, K., and Hohenberger, S. (2009). Key-
private proxy re-encryption. In Cryptographers Track
at the RSA Conference, pages 279–294. Springer.
Ateniese, G., Fu, K., Green, M., and Hohenberger, S.
(2006). Improved proxy re-encryption schemes with
applications to secure distributed storage. ACM Trans-
actions on Information and System Security (TISSEC),
9(1):1–30.
Blaze, M., Bleumer, G., and Strauss, M. (1998). Divertible
protocols and atomic proxy cryptography. In Interna-
tional Conference on the Theory and Applications of
Cryptographic Techniques, pages 127–144. Springer.
Boneh, D. and Franklin, M. (2001). Identity-based encryp-
tion from the weil pairing. In Annual international
cryptology conference, pages 213–229. Springer.
Boronat, J.-P. (2017). Vritable nergie du territoire positif et
modulaire.
Brinkhaus, S., Carluccio, D., Greveler, U., Justus, B., L
¨
ohr,
D., and Wegener, C. (2011). Smart hacking for pri-
vacy. In Proceeding of the 28th Chaos Communica-
tion Congress (28C3).
Canetti, R. (2001). Universally composable security: A new
paradigm for cryptographic protocols. In Foundations
of Computer Science, 2001. Proceedings. 42nd IEEE
Symposium on, pages 136–145. IEEE.
Canetti, R. and Hohenberger, S. (2007). Chosen-ciphertext
secure proxy re-encryption. In Proceedings of the 14th
ACM conference on Computer and communications
security, pages 185–194. ACM.
Chow, S. S., Weng, J., Yang, Y., and Deng, R. H. (2010).
Efficient unidirectional proxy re-encryption. In Inter-
national Conference on Cryptology in Africa, pages
316–332. Springer.
Deng, R. H., Weng, J., Liu, S., and Chen, K. (2008).
Chosen-ciphertext secure proxy re-encryption without
pairings. In International Conference on Cryptology
and Network Security, pages 1–17. Springer.
Fiat, A. and Naor, M. (1993). Broadcast encryption. In
Annual International Cryptology Conference, pages
480–491. Springer.
Green, M. and Ateniese, G. (2007). Identity-based proxy
re-encryption. In Applied Cryptography and Network
Security, pages 288–306. Springer.
Gueron, S. and Krasnov, V. (2015). Fast prime field elliptic-
curve cryptography with 256-bit primes. Journal of
Cryptographic Engineering, 5(2):141–151.
Hasan, M. M. and Mouftah, H. T. (2015). Encryption as
a service for smart grid advanced metering infrastruc-
ture. In Computers and Communication (ISCC), 2015
IEEE Symposium on, pages 216–221. IEEE.
Ivan, A.-A. and Dodis, Y. (2003). Proxy cryptography re-
visited. In NDSS.
Jivanyan, A., Yeghiazaryan, R., Darbinyan, A., and
Manukyan, A. (2015). Secure collaboration in public
cloud storages. In CYTED-RITOS International Work-
shop on Groupware, pages 190–197. Springer.
Kang, S., Veeravalli, B., and Aung, K. M. M. (2014).
Espresso: An encryption as a service for cloud stor-
age systems. In IFIP International Conference on Au-
tonomous Infrastructure, Management and Security,
pages 15–28. Springer.
Matrosov, A., Rodionov, E., Harley, D., and Malcho, J.
(2010). Stuxnet under the microscope. ESET LLC
(September 2010).
Nu
˜
nez, D., Agudo, I., and Lopez, J. (2017). Proxy re-
encryption: Analysis of constructions and its applica-
tion to secure access delegation. Journal of Network
and Computer Applications, 87:193–209.
Popa, R. A., Zeldovich, N., and Balakrishnan, H. (2011).
Cryptdb: A practical encrypted relational dbms.
Qin, Z., Xiong, H., Wu, S., and Batamuliza, J. (2016). A
survey of proxy re-encryption for secure data sharing
in cloud computing. IEEE Transactions on Services
Computing.
Ronen, E., Shamir, A., Weingarten, A.-O., and OFlynn, C.
(2017). Iot goes nuclear: Creating a zigbee chain re-
action. In Security and Privacy (SP), 2017 IEEE Sym-
posium on, pages 195–212. IEEE.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based
encryption. In Annual International Conference on
the Theory and Applications of Cryptographic Tech-
niques, pages 457–473. Springer.
Selvi, S. S. D., Paul, A., and Pandurangan, C. (2017).
A provably-secure unidirectional proxy re-encryption
scheme without pairing in the random oracle model.
In International Conference on Cryptology and Net-
work Security, pages 459–469. Springer.
Shao, J. and Cao, Z. (2009). Cca-secure proxy re-
encryption without pairings. In International Work-
shop on Public Key Cryptography, pages 357–376.
Springer.
Stark, E., Hamburg, M., and Boneh, D. (2013). Stanford
javascript crypto library.
Tang, L., Ouyang, L., and Tsai, W.-T. (2015). Multi-
factor web api security for securing mobile cloud.
In Fuzzy Systems and Knowledge Discovery (FSKD),
2015 12th International Conference on, pages 2163–
2168. IEEE.
PRE as a Service within Smart Grid City
401