Results 21 to 30 of about 19,760 (270)

Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment

open access: yesIEEE Access, 2020
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of low latency, storage, and computing resources that serve IoT applications ...
Osama A. Khashan
doaj   +1 more source

Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices

open access: yesMathematics, 2023
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic.
Er-Shuo Zhuang, Chun-I Fan
doaj   +1 more source

Anonymous proxy re‐encryption

open access: yesSecurity and Communication Networks, 2011
ABSTRACTProxy re‐encryption (PRE) is a public key encryption that allows a semi‐trusted proxy with some information (a.k.a., re‐encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system.
Jun Shao, Peng Liu, Guiyi Wei, Yun Ling
openaire   +1 more source

Non-transferable unidirectional proxy re-encryption scheme for secure social cloud storage sharing [PDF]

open access: yes, 2016
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Hao, Wei   +3 more
core   +1 more source

Secure Outsourced Blockchain-Based Medical Data Sharing System Using Proxy Re-Encryption

open access: yesApplied Sciences, 2021
The security and privacy of electronic health records (EHRs) have received considerable attention from healthcare workers and researchers. To ensure security, various encryption and decryption schemes as well as key management protocols have been ...
Young-Hoon Park   +3 more
doaj   +1 more source

Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption [PDF]

open access: yesIEEE Transactions on Information Theory, 2008
In 1998, Blaze, Bleumer and Strauss introduced a cryptographic primitive called proxy re-encryption in which a proxy can transform-without seeing the plaintext-a ciphertext encrypted under one key into an encryption of the same plaintext under another key. The concept has recently drawn renewed interest.
Libert, Benoit, Vergnaud, Damien
openaire   +2 more sources

Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things [PDF]

open access: yes, 2016
International audienceThe Internet of Things (IoT) is composed of a wide range of heterogeneous network devices that communicate with their users and the surrounding devices.
A Syalim   +17 more
core   +3 more sources

Cost-effective secure e-health cloud system using identity based cryptographic techniques [PDF]

open access: yes, 2016
Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients.
Luo, Xiaoshuang   +4 more
core   +2 more sources

A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme [PDF]

open access: yesJournal of the Korea Institute of Information Security and Cryptology, 2013
Proxy re-encryption scheme has advantage where plaintext does not get exposed during re-encryption process. This scheme is popular for sharing server-saved data in case of cloud computing or mobile office that uses server to save data. Since previous proxy re-encryption schemes can use re-encryption key over and over again, it may abuse re-encryption ...
Junggab Son, Heekuck Oh, SangJin Kim
openaire   +1 more source

Proxy re-encryption schemes for IoT and crowd sensing [PDF]

open access: yes, 2016
IoT, crowd sensing and smart cities will be a traffic challenge. New communication paradigms as asynchronous messaging carry and forward, scheduled delivery and temporary storage will be needed to manage network resources dynamically.
Almenares, Florina   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy