Results 221 to 230 of about 19,760 (270)
Non-Transferable Proxy Re-Encryption Scheme [PDF]
A proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (delegator) to a ciphertext for Bob (delegatee) without seeing the underlying plaintext. However, existing PRE schemes generally suffer from at least one of the followings.
Hui, CK, Yiu, SM, Chim, TW, He, Y
openaire +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
We put forward the notion of universal proxy re-encryption (UPRE). A UPRE scheme enables a proxy to convert a ciphertext under a (delegator) public key of any existing public-key encryption (PKE) scheme into another ciphertext under a (delegatee) public key of any existing PKE scheme (possibly different from the delegator one).
Döttling, Nico, Nishimaki, Ryo
openaire +1 more source
We put forward the notion of universal proxy re-encryption (UPRE). A UPRE scheme enables a proxy to convert a ciphertext under a (delegator) public key of any existing public-key encryption (PKE) scheme into another ciphertext under a (delegatee) public key of any existing PKE scheme (possibly different from the delegator one).
Döttling, Nico, Nishimaki, Ryo
openaire +1 more source
Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption
2011 Seventh International Conference on Computational Intelligence and Security, 2011Proxy re-encryption (PRE) allows a proxy to transform a cipher text for Alice (delegator) to be the one which can be decrypted by Bob (delegatee). Since it is introduced by Blaze et al. in 1998, many variants of PRE have been proposed. In this paper, we concentrate on two of them: anonymous conditional proxy re-encryption (ACPRE) and constrained proxy ...
WeiDong Zhong +3 more
openaire +1 more source
Generally Hybrid Proxy Re-Encryption
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016Proxy Re-Encryption (PRE) is a favorable primitive to realize a cryptographic cloud with secure and flexible data sharing mechanism. A number of PRE schemes with versatile capabilities have been proposed for different applications. The secure data sharing can be internally achieved in each PRE scheme.
Peng Xu +5 more
openaire +1 more source
Fuzzy conditional proxy re-encryption
Science China Information Sciences, 2012Weng et al. introduced the notion of conditional proxy re-encryption (C-PRE), whereby only the ciphertext satisfying one condition set by Alice can be re-encrypted by the proxy. To achieve more fine-grained delegation on the condition set, we introduce a new cryptographic primitive called fuzzy conditional proxy re-encryption (FC-PRE) in which we view ...
LiMing Fang +3 more
openaire +1 more source
Hierarchical conditional proxy re-encryption
Computer Standards & Interfaces, 2012In this paper, we introduce a new primitive called hierarchical conditional proxy re-encryption (HC-PRE) that enhances the concept of C-PRE by allowing more general re-encryption key delegation patterns. Hierarchical conditional proxy re-encryption (HC-PRE) scheme is the hierarchical extension of conditional proxy re-encryption (C-PRE) where the ...
Fang, Liming +3 more
openaire +2 more sources
2011 Seventh International Conference on Computational Intelligence and Security, 2011
The traditional proxy re-encryption (PRE) or conditional proxy re-encryption (CPRE) can re-encrypt infinite times on the delegator's cipher text. However many practical applications do not need this property, they prefer the delegator can control on the times the proxy can re-encrypt.
Xu An Wang +3 more
openaire +1 more source
The traditional proxy re-encryption (PRE) or conditional proxy re-encryption (CPRE) can re-encrypt infinite times on the delegator's cipher text. However many practical applications do not need this property, they prefer the delegator can control on the times the proxy can re-encrypt.
Xu An Wang +3 more
openaire +1 more source
Proxy Re-encryption with Unforgeable Re-encryption Keys
2014Proxy re-encryption PRE provides nice solutions to the delegation of decryption rights. In proxy re-encryption, the delegator Alice generates re-encryption keys for a semi-trusted proxy, with which the proxy can translate a ciphertext intended for Alice into a ciphertext for the delegatee Bob of the same plaintext.
Hui Guo, Zhenfeng Zhang, Jiang Zhang
openaire +1 more source

