Acknowledgement
Supported by : National Research Foundation of Korea (NRF)
References
- X. Liang, Z. Cao, H. Lin, and J. Shao, "Attribute based proxy reencryption with delegating capabilities," in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, pp. 276-286, 2009.
- H. Seo and H. Kim, "Attribute-based proxy re-encryption with a constant number of pairing operations," Journal of Information and Communication Convergence Engineering, vol. 10, no. 1, pp. 53-60, 2012. https://doi.org/10.6109/jicce.2012.10.1.053
- S. T. Nguyen and C. Rong, "ZigBee security using identity-based cryptography," Autonomic and Trusted Computing, Lecture Notes in Computer Science, vol. 4610, pp. 3-12, 2007.
- D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," Advances in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 213-229, 2001.
- H. Seo, C. S. Kim, and H. Kim, "ZigBee security for Home automation using attribute-based cryptography," in Proceedings of the IEEE International Conference on Consumer Electronics, Las Vegas: NV, pp. 364-368, 2011.
- H. Seo and H. Kim, "Zigbee security for visitors in home automation using attribute based proxy re-encryption," in Proceedings of the 15th IEEE International Symposium on Consumer Electronics, Singapore, pp. 304-307, 2011.
- L. B. Oliveira, D. F. Aranha, C. P. L. Gouvea, M. Scott, D. F. Camara, J. Lopez, and R. Dahab, "TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks," Computer Communications, vol. 34, no. 3, pp. 485-493, 2011. https://doi.org/10.1016/j.comcom.2010.05.013