Results 231 to 240 of about 19,760 (270)
Some of the next articles are maybe not open access.
2014
Among the variants of public key encryption schemes, the proxy re-encryption primitive (PRE) allows a user, say Alice, to decide that a delegate, say Bob, will be able to read her private messages. This is made possible thanks to a third party, the proxy, which is given a re-encryption key to transform a ciphertext intended to Alice into one intended ...
Sébastien Canard, Julien Devigne
openaire +1 more source
Among the variants of public key encryption schemes, the proxy re-encryption primitive (PRE) allows a user, say Alice, to decide that a delegate, say Bob, will be able to read her private messages. This is made possible thanks to a third party, the proxy, which is given a re-encryption key to transform a ciphertext intended to Alice into one intended ...
Sébastien Canard, Julien Devigne
openaire +1 more source
Improved Attribute Proxy Re-encryption Scheme
2021With the development of cloud computing, storing and sharing medical data in the cloud is envisioned as a promising method for supporting a large scale of users. However, if the sensitive information contained in the medical data (e.g., prescribed drug) is leaked, the user privacy will be damaged.
Wang Zhan +4 more
openaire +1 more source
Adaptively Secure Proxy Re-encryption
2019A proxy re-encryption (PRE) scheme is a public-key encryption scheme that allows the holder of a key pk to derive a re-encryption key for any other key pk′. This re-encryption key lets anyone transform ciphertexts under pk into ciphertexts under pk′ without having to know the underlying message, while transformations from pk′to pk should not be ...
Fuchsbauer, Georg +3 more
openaire +2 more sources
Certificateless Proxy Re-Encryption Without Pairing
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015Proxy Re-Encryption was introduced by Blaze, Bleumer and Strauss to efficiently solve the problem of delegation of decryption rights. In proxy re-encryption, a semi-honest proxy transforms a ciphertext intended for Alice to a ciphertext of the same message for Bob without learning anything about the underlying message.
Akshayaram Srinivasan, C. Pandu Rangan
openaire +1 more source
Elliptic Curve Based Proxy Re-Encryption
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016Proxy re-encryption is a scheme where a semi-trusted proxy alters the confidential message of one party into a confidential message of another party without knowing the original plaintext. To do the same, various approaches are suggested in the public key set up cryptography.
V. Thangam, K. Chandrasekaran
openaire +1 more source
Multi-Use Conditional Proxy Re-encryption
2013 International Conference on Information Science and Cloud Computing Companion, 2013In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an encrypted mails sent to her, which contains a specific word and satisfies the condition set on the proxy by Alice, and Bob also can ...
Lequn Mo, Guoxiang Yao
openaire +1 more source
Multi-Use Unidirectional Proxy Re-Encryption
2011 IEEE International Conference on Communications (ICC), 2011This paper presents the first multi-use unidirectional proxy re-encryption scheme proven-secure against chosenciphertext attacks and collusion attacks in the standard model. Although our proposal features a linear ciphertext size and decryption time in the number of translations, we emphasize that it is the first multi-use and unidirectional ...
Jun Shao +3 more
openaire +1 more source
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption
2015In this paper, we introduce a new functionality for proxy re-encryption (PRE) that we call re-encryption verifiability. In a PRE scheme with re-encryption verifiability (which we simply call verifiable PRE, or VPRE), a receiver of a re-encrypted ciphertext can verify whether the received ciphertext is correctly transformed from an original ciphertext ...
Satsuya Ohata +4 more
openaire +1 more source
Identity-Based Conditional Proxy Re-Encryption
2011 IEEE International Conference on Communications (ICC), 2011This paper proposes a new cryptographic primitive, named identity-based conditional proxy re-encryption (IBCPRE). In this primitive, a proxy with some information (a.k.a. re-encryption key) is allowed to transform a subset of ciphertexts under an identity to other ciphertexts under another identity.
Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
openaire +1 more source
Proxy re-encryption with keyword search
Information Sciences, 2010zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shao, Jun +3 more
openaire +2 more sources

