Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes [PDF]
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh +3 more
doaj +4 more sources
A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing [PDF]
The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can ...
Juyan Li +3 more
doaj +2 more sources
Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme [PDF]
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic ...
Yongli Tang +4 more
doaj +2 more sources
Revocable attribute-based proxy re-encryption [PDF]
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into ...
Luo Fucai, Al-Kuwari Saif
doaj +3 more sources
An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds [PDF]
IoT-based data outsourcing services in clouds could be regarded as a new trend in recent years, as they could reduce the hardware and software cost for enterprises and obtain higher flexibility.
Han-Yu Lin, Yao-Min Hung
doaj +2 more sources
Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes [PDF]
Existing attribute-based proxy re-encryption schemes suffer from issues like complex access policies, large ciphertext storage space consumption, and an excessive authority of the authorization center, leading to weak security and controllability of data
Wenlong Yi +4 more
doaj +2 more sources
End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption [PDF]
In light of the existing security vulnerabilities within IoT publish–subscribe systems, our study introduces an improved end-to-end encryption approach using conditional proxy re-encryption.
Shi Lin, Li Cui, Niu Ke
doaj +2 more sources
Attribute-based proxy re-encryption with keyword search. [PDF]
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy.
Yanfeng Shi +5 more
doaj +2 more sources
Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products [PDF]
In today’s globalized agricultural system, information leakage of agricultural biological risk factors can lead to business risks and public panic, jeopardizing corporate reputation. To solve the above problems, this study constructs a blockchain network
Shaohua Wang +5 more
doaj +2 more sources
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important ...
Shang LIU, Yinzhang GUO
doaj +3 more sources

