Results 1 to 10 of about 1,131 (250)
Attribute-based proxy re-encryption scheme with multiple features
A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to ...
Chaosheng FENG +4 more
doaj +2 more sources
Proxy Re-Encryption Scheme for Decentralized Storage Networks
Storage is a promising application for permission-less blockchains. Before blockchain, cloud storage was hosted by a trusted service provider. The centralized system controls the permission of the data access. In web3, users own their data.
Jia Kan, Jie Zhang, Dawei Liu, Xin Huang
doaj +1 more source
Proxy Re-Encryption Scheme Supporting Keyword Search in Email System [PDF]
To authorize others to deal with encrypted mails and enable the search of encrypted mails in an encrypted email system,this paper proposes a proxy re-encryption scheme that supports keyword search for email systems.In this scheme,searchable encryption ...
NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
doaj +1 more source
Certificateless Proxy Re-Encryption (CL-PRE) eliminates certificate management and private key exposure risks for blockchain data sharing, but existing schemes have critical security vulnerabilities and performance limitations.
S. Remya +4 more
doaj +1 more source
A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing
With rapidly increasing adoption of cloud computing and the advancement of today mobile computing, it is inevitable that mobile devices are used to receive and send the data through the mobile cloud platform.
Somchart Fugkeaw
doaj +1 more source
An outsourcing re-encryption program can help a ciphertext owner (delegator) transform his/her ciphertext into another ciphertext of delegatee. For example, an e-mail receiver can re-transfer an encrypted e-mail to his secretary while allowing the e-mail
Mingwu Zhang +3 more
doaj +1 more source
Proxy Re-encryption from Lattices [PDF]
We propose a new unidirectional proxy re-encryption scheme based on the hardness of the LWE problem. Our construction is collusionsafe and does not require any trusted authority for the re-encryption key generation. We extend a recent trapdoor definition for a lattice of Micciancio and Peikert. Our proxy re-encryption scheme is provably CCA-1 secure in
openaire +1 more source
Efficient Unidirectional Proxy Re-Encryption
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re-encryption key given by Alice, and cannot learn anything about the plaintext encrypted.
CHOW, Sherman +3 more
openaire +3 more sources
An Enhanced Approach for CP-ABE with Proxy Re-encryption in IoT Paradigm
In Internet of Things (IoT), encryption is a technique in which plaintext is converted to ciphertext to make it non-recovered by the attacker without secret key.
Nishant Doshi
doaj +1 more source
Conditional Proxy Broadcast Re-Encryption
A proxy re-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts decryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, we introduce a more generalized notion of conditional proxy broadcast re-encryption (CPBRE).
CHU, Cheng-Kang +4 more
openaire +3 more sources

