Results 21 to 30 of about 19,760 (270)
Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of low latency, storage, and computing resources that serve IoT applications ...
Osama A. Khashan
doaj +1 more source
Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic.
Er-Shuo Zhuang, Chun-I Fan
doaj +1 more source
ABSTRACTProxy re‐encryption (PRE) is a public key encryption that allows a semi‐trusted proxy with some information (a.k.a., re‐encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system.
Jun Shao, Peng Liu, Guiyi Wei, Yun Ling
openaire +1 more source
Non-transferable unidirectional proxy re-encryption scheme for secure social cloud storage sharing [PDF]
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Hao, Wei +3 more
core +1 more source
Secure Outsourced Blockchain-Based Medical Data Sharing System Using Proxy Re-Encryption
The security and privacy of electronic health records (EHRs) have received considerable attention from healthcare workers and researchers. To ensure security, various encryption and decryption schemes as well as key management protocols have been ...
Young-Hoon Park +3 more
doaj +1 more source
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption [PDF]
In 1998, Blaze, Bleumer and Strauss introduced a cryptographic primitive called proxy re-encryption in which a proxy can transform-without seeing the plaintext-a ciphertext encrypted under one key into an encryption of the same plaintext under another key. The concept has recently drawn renewed interest.
Libert, Benoit, Vergnaud, Damien
openaire +2 more sources
Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things [PDF]
International audienceThe Internet of Things (IoT) is composed of a wide range of heterogeneous network devices that communicate with their users and the surrounding devices.
A Syalim +17 more
core +3 more sources
Cost-effective secure e-health cloud system using identity based cryptographic techniques [PDF]
Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients.
Luo, Xiaoshuang +4 more
core +2 more sources
A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme [PDF]
Proxy re-encryption scheme has advantage where plaintext does not get exposed during re-encryption process. This scheme is popular for sharing server-saved data in case of cloud computing or mobile office that uses server to save data. Since previous proxy re-encryption schemes can use re-encryption key over and over again, it may abuse re-encryption ...
Junggab Son, Heekuck Oh, SangJin Kim
openaire +1 more source
Proxy re-encryption schemes for IoT and crowd sensing [PDF]
IoT, crowd sensing and smart cities will be a traffic challenge. New communication paradigms as asynchronous messaging carry and forward, scheduled delivery and temporary storage will be needed to manage network resources dynamically.
Almenares, Florina +4 more
core +1 more source

