Results 231 to 240 of about 19,760 (270)
Some of the next articles are maybe not open access.

Combined Proxy Re-encryption

2014
Among the variants of public key encryption schemes, the proxy re-encryption primitive (PRE) allows a user, say Alice, to decide that a delegate, say Bob, will be able to read her private messages. This is made possible thanks to a third party, the proxy, which is given a re-encryption key to transform a ciphertext intended to Alice into one intended ...
Sébastien Canard, Julien Devigne
openaire   +1 more source

Improved Attribute Proxy Re-encryption Scheme

2021
With the development of cloud computing, storing and sharing medical data in the cloud is envisioned as a promising method for supporting a large scale of users. However, if the sensitive information contained in the medical data (e.g., prescribed drug) is leaked, the user privacy will be damaged.
Wang Zhan   +4 more
openaire   +1 more source

Adaptively Secure Proxy Re-encryption

2019
A proxy re-encryption (PRE) scheme is a public-key encryption scheme that allows the holder of a key pk to derive a re-encryption key for any other key pk′. This re-encryption key lets anyone transform ciphertexts under pk into ciphertexts under pk′ without having to know the underlying message, while transformations from pk′to pk should not be ...
Fuchsbauer, Georg   +3 more
openaire   +2 more sources

Certificateless Proxy Re-Encryption Without Pairing

Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
Proxy Re-Encryption was introduced by Blaze, Bleumer and Strauss to efficiently solve the problem of delegation of decryption rights. In proxy re-encryption, a semi-honest proxy transforms a ciphertext intended for Alice to a ciphertext of the same message for Bob without learning anything about the underlying message.
Akshayaram Srinivasan, C. Pandu Rangan
openaire   +1 more source

Elliptic Curve Based Proxy Re-Encryption

Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016
Proxy re-encryption is a scheme where a semi-trusted proxy alters the confidential message of one party into a confidential message of another party without knowing the original plaintext. To do the same, various approaches are suggested in the public key set up cryptography.
V. Thangam, K. Chandrasekaran
openaire   +1 more source

Multi-Use Conditional Proxy Re-encryption

2013 International Conference on Information Science and Cloud Computing Companion, 2013
In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an encrypted mails sent to her, which contains a specific word and satisfies the condition set on the proxy by Alice, and Bob also can ...
Lequn Mo, Guoxiang Yao
openaire   +1 more source

Multi-Use Unidirectional Proxy Re-Encryption

2011 IEEE International Conference on Communications (ICC), 2011
This paper presents the first multi-use unidirectional proxy re-encryption scheme proven-secure against chosenciphertext attacks and collusion attacks in the standard model. Although our proposal features a linear ciphertext size and decryption time in the number of translations, we emphasize that it is the first multi-use and unidirectional ...
Jun Shao   +3 more
openaire   +1 more source

Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption

2015
In this paper, we introduce a new functionality for proxy re-encryption (PRE) that we call re-encryption verifiability. In a PRE scheme with re-encryption verifiability (which we simply call verifiable PRE, or VPRE), a receiver of a re-encrypted ciphertext can verify whether the received ciphertext is correctly transformed from an original ciphertext ...
Satsuya Ohata   +4 more
openaire   +1 more source

Identity-Based Conditional Proxy Re-Encryption

2011 IEEE International Conference on Communications (ICC), 2011
This paper proposes a new cryptographic primitive, named identity-based conditional proxy re-encryption (IBCPRE). In this primitive, a proxy with some information (a.k.a. re-encryption key) is allowed to transform a subset of ciphertexts under an identity to other ciphertexts under another identity.
Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
openaire   +1 more source

Proxy re-encryption with keyword search

Information Sciences, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shao, Jun   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy