Results 21 to 30 of about 1,131 (250)
CLAP-PRE: Certificateless Autonomous Path Proxy Re-Encryption for Data Sharing in the Cloud
In e-health systems, patients encrypt their personal health data for privacy purposes and upload them to the cloud. There exists a need for sharing patient health data with doctors for healing purposes in one’s own preferred order.
Chengdong Ren +4 more
doaj +1 more source
Provably Secure Identity-based Conditional Proxy Re-encryption Scheme [PDF]
The conditional proxy re-encryption based on the traditional public key cryptosystem is mature,but the Identity-based Proxy Re-encryption(IBPRE) scheme,controlling agents’ permissions from the fine-grained level is a problem needed to be solved.Thus,this
YE Weiwei,OU Qingyu,WEI Wei
doaj +1 more source
Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing
Cloud computing has become popular in data sharing mainly because it has huge storage capacity and computing power. Securing the privacy of sensitive data for cloud-based data sharing is vital. Currently, there are various conditional proxy re-encryption
Huidan Hu +3 more
doaj +1 more source
Key-Private Proxy Re-encryption [PDF]
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very least, the proxy should not be able to learn the keys
ATENIESE, GIUSEPPE +2 more
openaire +1 more source
Non-transferable Proxy Re-encryption [PDF]
The traditional security notion of proxy re-encryption (PRE) focuses on preventing the proxy learning anything about the encrypted messages. However, such a basic security requirement is clearly not enough for scenarios where the proxy can collude with Bob.
Hui Guo +3 more
openaire +1 more source
Identity-based Searchable Encryption Scheme Supporting Proxy Re-encryption [PDF]
The existing Identity-based Encryption with Keyword Search (IBEKS) cannot share search permissions.Therefore,an Identity-based Proxy Re-encryption with Keyword Search (IBPKS) scheme in cloud environment is proposed.The identity-based encryption algorithm
ZHU Minhui,CHEN Yanli,HU Yuanyuan
doaj +1 more source
Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of low latency, storage, and computing resources that serve IoT applications ...
Osama A. Khashan
doaj +1 more source
Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic.
Er-Shuo Zhuang, Chun-I Fan
doaj +1 more source
ABSTRACTProxy re‐encryption (PRE) is a public key encryption that allows a semi‐trusted proxy with some information (a.k.a., re‐encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system.
Jun Shao, Peng Liu, Guiyi Wei, Yun Ling
openaire +1 more source
Secure Outsourced Blockchain-Based Medical Data Sharing System Using Proxy Re-Encryption
The security and privacy of electronic health records (EHRs) have received considerable attention from healthcare workers and researchers. To ensure security, various encryption and decryption schemes as well as key management protocols have been ...
Young-Hoon Park +3 more
doaj +1 more source

