Results 1 to 10 of about 19,760 (270)

Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes [PDF]

open access: yesIET Information Security, 2021
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh   +3 more
doaj   +4 more sources

A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing [PDF]

open access: yesSensors, 2021
The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can ...
Juyan Li   +3 more
doaj   +2 more sources

Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme [PDF]

open access: yesEntropy, 2023
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic ...
Yongli Tang   +4 more
doaj   +2 more sources

Revocable attribute-based proxy re-encryption [PDF]

open access: yesJournal of Mathematical Cryptology, 2021
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into ...
Luo Fucai, Al-Kuwari Saif
doaj   +3 more sources

An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds [PDF]

open access: yesSensors, 2020
IoT-based data outsourcing services in clouds could be regarded as a new trend in recent years, as they could reduce the hardware and software cost for enterprises and obtain higher flexibility.
Han-Yu Lin, Yao-Min Hung
doaj   +2 more sources

Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes [PDF]

open access: yesSensors
Existing attribute-based proxy re-encryption schemes suffer from issues like complex access policies, large ciphertext storage space consumption, and an excessive authority of the authorization center, leading to weak security and controllability of data
Wenlong Yi   +4 more
doaj   +2 more sources

End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption [PDF]

open access: yesSensors
In light of the existing security vulnerabilities within IoT publish–subscribe systems, our study introduces an improved end-to-end encryption approach using conditional proxy re-encryption.
Shi Lin, Li Cui, Niu Ke
doaj   +2 more sources

Attribute-based proxy re-encryption with keyword search. [PDF]

open access: yesPLoS ONE, 2014
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy.
Yanfeng Shi   +5 more
doaj   +2 more sources

Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products [PDF]

open access: yesScientific Reports
In today’s globalized agricultural system, information leakage of agricultural biological risk factors can lead to business risks and public panic, jeopardizing corporate reputation. To solve the above problems, this study constructs a blockchain network
Shaohua Wang   +5 more
doaj   +2 more sources

Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing

open access: yes网络与信息安全学报, 2022
Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important ...
Shang LIU, Yinzhang GUO
doaj   +3 more sources

Home - About - Disclaimer - Privacy