OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data
Abstract
1. Introduction
- 1.
- In our scheme, we develop a lattice-based Identity-Based Matchmaking Proxy Re-Encryption (IB-MPRE) scheme for exercise physiological data. The scheme not only effectively safeguards identity privacy and exercise physiological data security but also enables secure ciphertext transformation based on user identity attributes;
- 2.
- By introducing online/offline technology, complex computations in the proposed scheme are pre-processed offline, significantly enhancing system performance to meet the requirement for sensor data upload. Experiment findings indicate that the suggested scheme is superior in efficiency to other existing approaches;
- 3.
- We demonstrate the security of the OO-IB-MPRE scheme by proving its semi-selective privacy under the Learning With Errors (LWE) assumption and its authenticity under the Inhomogeneous Small Integer Solution (ISIS) problem.
2. Related Work
3. Preliminaries
- Let be chosen at random, then .
- Let R be sampled from , then we have .
- SamplePre: Takes as input a matrix , its trapdoor , a vector , and a parameter , output a vector , satisfying and .
- SampleLeft: Takes as input a matrix and its trapdoor , a matrix , a vector , and a parameter , output a vector whose distribution is statistically close to .
- SampleRight: Takes as input a matrix , the gadget matrix G and its trapdoor , a uniform random matrix , a vector , and a parameter , output a vector whose distribution is statistically close to .
4. Formal Definition and Security Model
4.1. System Model
- Trusted Authority (TA): Generates the system’s master public key and master private key. It generates the sender’s enc key based on the sender’s identity and the receiver’s decryption key based on the receiver’s identity, and can also generate the re-enc key based on the receiver’s identity.
- Sender: (a) Offline Phase: Pre-executes a large number of complex calculations to generate the intermediate ciphertext. (b) Online Phase: When real-time data needs to be encrypted, it combines the intermediate ciphertext, the target identity specified by the sender, and the plaintext to generate the final original ciphertext.
- Proxy (typically a cloud service provider): Decrypts the ciphertext stored in the cloud to generate the re-encrypted ciphertext.
- Receiver: Decrypts the data using their own decryption key and the ciphertext encrypted by the sender (including the original ciphertext and the re-encrypted ciphertext) and finally obtains the original plaintext.
4.2. Formal Definition
- : Inputs security parameter , TA outputs master public key and master private key pair .
- : Inputs , and sender’s identity , TA outputs enc key .
- : Inputs mpk, msk, and receiver’s identity , TA outputs decryption key .
- : Inputs , and sender-specified target identities and , TA outputs re-enc key from to .
- : Inputs and , the algorithm outputs intermediate ciphertext .
- : Inputs and plaintext m, the algorithm outputs complete original ciphertext .
- : Inputs and , if ct is the ciphertext corresponding to rcv, the algorithm outputs the re-encrypted ciphertext corresponding to ; otherwise, it outputs ⊥.
- : Inputs , receiver-specified target identity and (including original ciphertext and re-encrypted ciphertext), outputs m.
4.3. Security Model
- ➀
- Enc Key Oracle : inputs sender’s identity , returns enc key .
- ➁
- Decryption Key Oracle : inputs receiver’s identity , returns decryption key .
- ➂
- Re-Enc Key Oracle : inputs sender-specified target identities and , returns re-enc key .
- ➃
- Re-enc oracle : inputs , and , if is a valid ciphertext under , returns re-encrypted ciphertext .
- ➀
- for any .
- ➁
- for any , and , has been inquired.
- ➂
- for any , and , has been inquired.
- Guess: outputs a guess
- Output: If , output 1, otherwise output 0.
5. OO-IB-MPRE from Lattices
5.1. Construction
- . Input security parameter . TA performs the following operations.
- (1)
- Generate .
- (2)
- Randomly select , .
- (3)
- Randomly select two hash functions , where is a full-rank difference hash function [13].
- (4)
- Output the master public key and the master private key .
- . Input , and sender’s identity . TA performs the following operations.
- (1)
- Generate , where .
- (2)
- Output the enc key .
- . Input , and receiver’s identity . TA performs the following operations.
- (1)
- Let .
- (2)
- Generate , such that .
- (3)
- Output the decryption key .
- ReKeyGen. Input , the identity of the original target receiver identity and the identity of the converted target receiver identity . TA performs the following operations.
- (1)
- Let and be the two matrices corresponding to the original target receiver identity and the converted target receiver identity respectively.
- (2)
- Generate the re-enc key from to using the SampleLeft algorithm, i.e., compute , such that. It should be noted that for the subsequent security proof, there is no requirement for .
- (3)
- Output the re-enc key from to . Let be an m-order identity matrix, , then we have
- . Input and . Sender performs the following operations.
- (1)
- Computewhere , , the following norm operations are analogous, meaning they implicitly involve a modulo q operation.
- (2)
- Output the intermediate ciphertext .
- . Input , , target receiver identity , and plaintext m. Sender performs the following operations.
- (1)
- Compute
- (2)
- Output the original ciphertext .
- . Input , and . Proxy computes and outputs the re-encrypted ciphertext , where represents the multiplication of and . It should be noted that
- . Input , , target sender identity and . Receiver performs the following operations.
- (1)
- Compute .
- (2)
- Compared to 0, if z is closed to , output 1; otherwise output 0.
5.2. Correctness
- ➀
- Setup requires ;
- ➁
- EkGen requires ;
- ➂
- DkGen requires ;
- ➃
- RekeyGen requires ;
- ➄
- LWE requires .
5.3. Security
- : Identical to the semi-selective privacy security game.
- : Identical to , except for the generation of . In , the challenger randomly selects , , and sets .
- : Identical to , except for the generation of and B. In , the challenger randomly selects and generates .
- : Identical to , except for the generation of the ciphertext . The challenger randomly selects . Let , i.e., .
- : Identical to except for the generation of the challenge ciphertext . The challenger randomly selects , setting , .
- : Identical to the semi-selective authenticity security game.
- : Identical to , except for the generation of . In , algorithm randomly selects , , and sets .
- : Identical to , except for the generation of and B. In , algorithm randomly selects and generates .
- : Identical to , except for the generation of the matrix A. In , the algorithm randomly selects . When an adversary initiates a query for the hash value of user , algorithm first searches its local storage. If exists, it returns the corresponding hash value . If not found, it selects , then sets , stores locally, and returns the corresponding .
- : Identical to , except for the generation of the ciphertext . The algorithm randomly selects . Let , i.e., .
- : Identical to except for the generation of the challenge ciphertext . The algorithm randomly selects , setting , . At this point, the advantage of adversary in is negligible.
6. Performance
6.1. Space Overhead
6.2. Computational Overhead
6.3. Limitations and Discussion
- Storage and Bandwidth Overhead: As detailed in Table 2, the dimensionality of the underlying matrices leads to relatively large key sizes. In particular, the re-encryption key generated by the SampleLeft algorithm is a matrix belonging to the space . At elevated security parameter settings (e.g., ), the size of this key can reach the gigabyte (GB) scale.
- Computational Cost of Key Generation: Both the key generation and re-encryption key generation phases entail complex Gaussian sampling (as shown in Table 5). This computational overhead surpasses that of conventional bilinear pairing-based cryptographic schemes-a necessary trade-off to achieve resistance against quantum attacks. While such overhead is negligible in small-scale user deployment scenarios, it may create performance bottlenecks during the bulk registration of large user cohorts. This limitation can be alleviated through optimization strategies such as multi-authority hierarchical key generation.
- Trust Assumptions: The proposed system relies on a single Trusted Authority (TA) to generate all user private keys, which inherently introduces the key escrow problem prevalent in Identity-Based Encryption (IBE) systems. If the TA is compromised, the security of all system users will be irreparably jeopardized. Future research can address this vulnerability by decentralizing the trust architecture via multi-authority or threshold IBE techniques.
7. Real World Applications
- Management of College Physical Fitness Test Data. Students collect exercise physiological data (such as heart rate during endurance running and blood oxygen data related to lung capacity) during physical fitness tests via wearable sensors and upload the data to the cloud. The core requirements here are to protect data privacy (preventing the leakage of students’ physiological data) and ensure identity security (guaranteeing that data is accurately associated with the corresponding student), so as to support the authenticity and security of the physical fitness test results.
- Personalized Physical Education Instruction. Relying on the exercise physiological data stored in the cloud (such as a student’s running gait and lactic acid accumulation rate during strength training), teachers can develop differentiated training plans—for example, adjusting running postures for students with abnormal gaits or optimizing endurance training intensity for students with excessively fast lactic acid accumulation—thereby achieving targeted physical education teaching.
- Prevention of Sports Injuries and Rehabilitation Tracking. Injury Prevention: Real-time sports data (such as impact force when landing from a jump and joint movement angles) is monitored via sensors. When the data exceeds safety thresholds (e.g., excessive impact force), timely warnings are issued to avoid issues such as ankle sprains and knee joint injuries. Rehabilitation Tracking: It is necessary to synchronize the exercise data of students in the rehabilitation period (such as the range of motion of joints during rehabilitation training and the recovery status of muscle strength) to rehabilitation hospitals. Doctors adjust rehabilitation plans based on this data. Meanwhile, it is necessary to ensure the legitimate access of hospitals to data and prevent unrelated personnel from obtaining data.
- Students wear sensors to confirm proper functioning and bind personal information.
- TA executes the SetUp algorithm to generate a master public key and master private key pair.
- 3.
- The sender (student) uploads their identity to TA, which then runs the EkGen algorithm to generate the enc key for the athlete.
- 4.
- The TA runs the DkGen algorithm based on the recipient’s identity to generate the corresponding decryption key.
- 5.
- Coaches access data to analyze student status and develop personalized physical education instruction. Proctors access data to record physical test data.
- 6.
- Offline Enc: During idle periods, sensors worn by students (e.g., wristbands) run offline enc algorithms to generate intermediate ciphertext.
- 7.
- Online Enc: When uploading real-time data such as heart rate, step frequency, and blood oxygen saturation, the wristband executes an online enc algorithm. Combining the intermediate ciphertext, the designated target recipient, and the plaintext m (i.e., the data), it rapidly generates the final ciphertext.
- 8.
- Upload and store the generated ciphertext to the cloud server.
- 9.
- When it is necessary to expand the scope of data sharing (e.g., requiring physician involvement), the data owner runs the algorithm to generate the re-enc key based on the original identity and new identity , and sends it to the cloud server.
- 10.
- Upon authorization, the cloud server runs the algorithm to the stored original ciphertext , generating re-encrypted ciphertext .
- 11.
- When a data user (e.g., a doctor) needs to access data, they download the ciphertext (possibly or ) from the cloud server.
- 12.
- The doctor runs the algorithm using their own decryption key , their desired sender (student) identity, and the ciphertext. Decryption succeeds and yields the plaintext data m.
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Shamir, A. Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of CRYPTO 84 4; Springer: Berlin/Heidelberg, Germany, 1985; pp. 47–53. [Google Scholar]
- Gentry, C.; Peikert, C.; Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, BC, Canada, 30 May 2008; ACM: New York, NY, USA, 2008; pp. 197–206. [Google Scholar]
- Gao, W.; Yang, L.; Zhang, D.; Liu, X. Quantum identity-based encryption from the learning with errors problem. Cryptography 2022, 6, 9. [Google Scholar] [CrossRef]
- Ateniese, G.; Francati, D.; Nuñez, D.; Venturi, D. Match me if you can: Matchmaking encryption and its applications. In Proceedings of the Annual International Cryptology Conference, San Francisco, CA, USA, 1 August 2019; Springer International Publishing: Cham, Switzerland, 2019; pp. 701–731. [Google Scholar]
- Francati, D.; Guidi, A.; Russo, L.; Venturi, D. Identity-based matchmaking encryption without random oracles. In Proceedings of the International Conference on Cryptology in India, Kolkata, India, 9 December 2021; Springer International Publishing: Cham, Switzerland, 2021; pp. 415–435. [Google Scholar]
- Wu, A.; Luo, W.; Weng, J.; Yang, A.; Wen, J. Fuzzy Identity-Based Matchmaking Encryption and Its Application. IEEE Trans. Inf. Forensics Secur. 2023, 18, 5592–5607. [Google Scholar] [CrossRef]
- Wang, H.; Chen, K.; Xie, Q.; Meng, Q. Post-Quantum Secure Identity-Based Matchmaking Encryption. IEEE Trans. Dependable Secur. Comput. 2025, 22, 833–844. [Google Scholar] [CrossRef]
- Chen, J.; Li, Y.; Wen, J.; Weng, J. Identity-based matchmaking encryption from standard assumptions. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, 5–9 December 2022; Springer Nature: Cham, Switzerland; pp. 394–422. [Google Scholar]
- Wang, Y.; Wang, B.; Lai, Q.; Zhan, Y. Identity-based matchmaking encryption with stronger security and instantiation on lattices. Theor. Comput. Sci. 2025, 1029, 115048. [Google Scholar] [CrossRef]
- Blaze, M.; Bleumer, G.; Strauss, M. Divertible protocols and atomic proxy cryptography. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Espoo, Finland, 31 May–4 June 1998; Springer: Berlin/Heidelberg, Germany, 1998; pp. 127–144. [Google Scholar]
- Green, M.; Ateniese, G. Identity-based proxy re-encryption. In Proceedings of the International Conference on Applied Cryptography and Network Security, Zhuhai, China, 5–8 June 2007; Springer: Berlin/Heidelberg, Germany; pp. 288–306. [Google Scholar]
- Wu, L.; Yang, X.; Zhang, M.; Wang, X. IB-VPRE: Adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. J. Ambient. Intell Hum. Comput. 2022, 13, 469–482. [Google Scholar]
- Agrawal, S.; Boneh, D.; Boyen, X. Efficient Lattice (H)IBE in the Standard Model. In Advances in Cryptology–EUROCRYPT 2010; Gilbert, H., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6110, pp. 553–572. [Google Scholar]
- Dutta, P.; Susilo, W.; Duong, D.H.; Roy, P.S. Collusion-resistant identity-based proxy re-encryption: Lattice-based constructions in standard model. Theor. Comput. Sci. 2021, 871, 16–29. [Google Scholar] [CrossRef]
- Dutta, P.; Susilo, W.; Duong, D.H.; Baek, J.; Roy, P.S. Lattice-Based unidirectional IBPRE secure in standard model. arXiv 2020, arXiv:2005.06741. [Google Scholar] [CrossRef]
- Li, J.; Ma, C.; Gu, Z. Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting. Int. J. Found. Comput. Sci. 2020, 31, 551–567. [Google Scholar] [CrossRef]
- Li, J.; Yan, M.; Peng, J.; Huang, H.; Abd El-Latif, A.A. A lattice-based efficient certificateless public key encryption for big data security in clouds. Future Gener. Comput. Syst. 2024, 158, 255–266. [Google Scholar] [CrossRef]
- Li, J.; Peng, J.; Qiao, Z. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment. Big Data 2024, 12, 357–366. [Google Scholar] [CrossRef] [PubMed]
- Ge, C.; Susilo, W.; Baek, J.; Liu, Z.; Xia, J.; Fang, L. A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secur. Comput. 2021, 19, 2907–2919. [Google Scholar] [CrossRef]
- Zhao, J.; Zhang, K.; Gong, J.; Qian, H. Lavida: Large-universe, verifiable, and dynamic fine-grained access control for e-health cloud. IEEE Trans. Inf. Forensics Secur. 2024, 19, 2732–2745. [Google Scholar] [CrossRef]
- Zhang, Q.; Fu, Y.; Cui, J.; He, D.; Zhong, H. Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT. IEEE Trans. Dependable Secur. Comput. 2024, 21, 5797–5809. [Google Scholar] [CrossRef]
- Guo, F.; Mu, Y.; Chen, Z. Identity-Based Online/Offline Encryption. In Financial Cryptography and Data Security; Tsudik, G., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2008; Volume 5143, pp. 247–261. [Google Scholar]
- Hohenberger, S.; Waters, B. Online/Offline Attribute-Based Encryption. In Public-Key Cryptography—PKC 2014; Krawczyk, H., Ed.; Springer: Berlin/Heidelberg, Germany, 2014; pp. 293–310. [Google Scholar]
- Lai, J.; Mu, Y.; Guo, F.; Susilo, W. Improved identity-based online/offline encryption. In Information Security and Privacy; Springer: Berlin/Heidelberg, Germany, 2015; pp. 160–173. [Google Scholar]
- Zuo, B.; Li, J.; Zhang, Y.; Shen, J. Identity-based online/offline encryption scheme from LWE. Information 2024, 15, 539. [Google Scholar] [CrossRef]
- Langrehr, R.; Pan, J. Tightly Secure Hierarchical Identity-Based Encryption. J. Cryptol. 2020, 33, 1787–1821. [Google Scholar] [CrossRef]
- Zhang, X.; Fu, X.; Hong, L.; Liu, Y.; Wang, L. Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network. Int. J. Distrib. Sens. Netw. 2020, 16, 155014772092873. [Google Scholar] [CrossRef]
- Yu, Q.; Li, J.; Ji, S. Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience. Secur. Commun. Netw. 2022, 2022, 6849761. [Google Scholar] [CrossRef]
- Micciancio, D.; Regev, O. Worst-case to average-case reductions based on Gaussian measures. Siam J. Comput. 2007, 37, 267–302. [Google Scholar] [CrossRef]
- Ajtai, M. Generating Hard Instances of the Short Basis Problem. In Automata, Languages and Programming; Wiedermann, J., Van Emde Boas, P., Nielsen, M., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1999; Volume 1644, pp. 1–9. [Google Scholar]
- Alwen, J.; Peikert, C. Generating Shorter Bases for Hard Random Lattices. Theory Comput. Syst 2011, 48, 535–553. [Google Scholar] [CrossRef]
- Micciancio, D.; Peikert, C. Trapdoors for lattices: Simpler, tighter, faster, smaller. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 700–718. [Google Scholar]
- Regev, O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM 2009, 56, 1–40. [Google Scholar] [CrossRef]








| Wang et al. [7] | Wu et al. [12] | Dutta et al. [15] | Li et al. [17] | Proposed Scheme | |
|---|---|---|---|---|---|
| plaintext size | 1 | 1 | 1 | 1 | 1 |
| public key size | — | — | |||
| private key size | |||||
| ciphertext size | |||||
| Re-encryption key size | — |
| Scheme | n | Public Key Size (KB) | Private Key Size (KB) | Ciphertext Size (KB) | Re-Encryption Key Size (KB) |
|---|---|---|---|---|---|
| Wang et al. [7] | 0.75 | 1.5 | 1.5 | — | |
| 3 | 6.0 | 6.0 | — | ||
| 12 | 24.0 | 24.0 | — | ||
| 48 | 96.0 | 96.0 | — | ||
| 192 | 384.0 | 384.0 | — | ||
| 768 | 1536.0 | 1536.0 | — | ||
| Wu et al. [12] | — | 1.5 | 1.5 | 18,442.6107 | |
| — | 6.0 | 6.0 | 295,002.6611 | ||
| — | 24.0 | 24.0 | 4,718,898.2084 | ||
| — | 96.0 | 96.0 | 75,500,317 | ||
| — | 384.0 | 384.0 | 1,208,823,118.5 | ||
| — | 1536.0 | 1536.0 | 19,327,408,403 | ||
| Dutta et al. [15] | — | 271.5302 | 1 | 1448.1547 | |
| — | 3072 | 4 | 16,384 | ||
| — | 34,770 | 16 | 185,442 | ||
| — | 393,216 | 64 | 2,097,152 | ||
| — | 4,446,603.6 | 256 | 23,715,219.2 | ||
| — | 50,331,648 | 1024 | 268,435,456 | ||
| Li et al. [17] | 24 | 1629.1758 | 1629.1758 | 11,659.7637 | |
| 192 | 18,432 | 18,432 | 175,104 | ||
| 1536 | 208,534.2715 | 208,534.2715 | 2,672,097.407 | ||
| 12,288 | 2,359,296 | 2,359,296 | 41,287,680 | ||
| 98,304 | 26,692,387.21 | 26,692,387.21 | 644,018,356.8 | ||
| 786,432 | 301,989,888 | 301,989,888 | 10,116,661,248 | ||
| Proposed scheme | 0.75 | 1.5 | 1.5 | 1629.1758 | |
| 3 | 6 | 6 | 18,432 | ||
| 12 | 24 | 24 | 208,534.2715 | ||
| 48 | 96 | 96 | 2,359,296 | ||
| 192 | 384 | 384 | 26,692,387.21 | ||
| 768 | 1536 | 1536 | 301,989,888 |
| Proposed Scheme | |
|---|---|
| online ciphertext size | |
| offline ciphertext size |
| Scheme | n | Online Ciphertext Size (KB) | Offline Ciphertext Size (KB) |
|---|---|---|---|
| Proposed scheme | 1.5 | 1.5221 | |
| 6 | 6.0625 | ||
| 24 | 24.1768 | ||
| 96 | 96.5 | ||
| 384 | 385.4142 | ||
| 1536 | 1540 |
| Basic Operation | When Execution Time (s) | When Execution Time (s) |
|---|---|---|
| 0.063 | 0.064 | |
| 2.080 | 2.076 | |
| 2.290 | 2.298 | |
| 0.004896 | 0.055118 | |
| 3.2885 | 43.9306 | |
| 0.6685625 | 8.40894 | |
| 5.61975 | 72.3685 | |
| 0.053 | 0.376 | |
| 0.111 | 1.09175 | |
| 0.05625 | 0.34225 | |
| 0.0000851 | 0.000352 | |
| 0.0001148 | 0.0004114 | |
| 0.0001127 | 0.0002909 | |
| 33.1398 | 661.1135 | |
| 0.05656 | 1.519259 | |
| 0.0000204025 | 0.0000143242 | |
| 0.000241805 | 0.00100945 | |
| 0.000124472 | 0.000528142 | |
| 0.0000130828 | 0.0000200966 | |
| 2.28288 | 41.8259 | |
| 0.002 | 0.012 | |
| 1.6515 | 16.1692 | |
| 0.017125 | 0.164375 | |
| 0.003 | 0.02025 | |
| 0.011 | 0.11775 | |
| 0.007625 | 0.023625 | |
| 0.0405 | 0.34625 | |
| 0.002 | 0.019 | |
| 0.00220187 | 0.0133956 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhao, Y.; Song, Y.; Song, W.; Li, J. OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data. Mathematics 2025, 13, 4004. https://doi.org/10.3390/math13244004
Zhao Y, Song Y, Song W, Li J. OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data. Mathematics. 2025; 13(24):4004. https://doi.org/10.3390/math13244004
Chicago/Turabian StyleZhao, You, Ye Song, Weiyi Song, and Juyan Li. 2025. "OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data" Mathematics 13, no. 24: 4004. https://doi.org/10.3390/math13244004
APA StyleZhao, Y., Song, Y., Song, W., & Li, J. (2025). OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data. Mathematics, 13(24), 4004. https://doi.org/10.3390/math13244004

