Results 31 to 40 of about 1,131 (250)

Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption [PDF]

open access: yesIEEE Transactions on Information Theory, 2008
In 1998, Blaze, Bleumer and Strauss introduced a cryptographic primitive called proxy re-encryption in which a proxy can transform-without seeing the plaintext-a ciphertext encrypted under one key into an encryption of the same plaintext under another key. The concept has recently drawn renewed interest.
Libert, Benoit, Vergnaud, Damien
openaire   +2 more sources

A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme [PDF]

open access: yesJournal of the Korea Institute of Information Security and Cryptology, 2013
Proxy re-encryption scheme has advantage where plaintext does not get exposed during re-encryption process. This scheme is popular for sharing server-saved data in case of cloud computing or mobile office that uses server to save data. Since previous proxy re-encryption schemes can use re-encryption key over and over again, it may abuse re-encryption ...
Junggab Son, Heekuck Oh, SangJin Kim
openaire   +1 more source

DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System

open access: yesIEEE Access, 2022
In e-healthcare system, an increasing number of patients enjoy high-quality medical services by sharing encrypted personal healthcare records (PHRs) with doctors or medical research institutions. However, one of the important issues is that the encrypted
Linlin Xue
doaj   +1 more source

Identity-Based Proxy Re-encryption [PDF]

open access: yes, 2007
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identityto ...
Matthew Green, ATENIESE, GIUSEPPE
openaire   +1 more source

Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application

open access: yesTongxin xuebao, 2021
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was ...
Ruiqi LI, Chunfu JIA, Yafei WANG
doaj   +2 more sources

Security scheduling and transaction mechanism of virtual power plants based on dual blockchains

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
Aiming at the data authenticity and storage problems in the current coordinated scheduling of virtual power plants, as well as the opaque information and high transaction costs, a dual blockchains security mechanism is proposed to solve above problems ...
Xiaohong Zhang   +3 more
doaj   +1 more source

Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds

open access: yesIEEE Access, 2022
Cloud computing with massive storage and computing capabilities has become widespread in actual applications. It is critical to ensure secure data sharing in cloud-based applications.
Huidan Hu, Zhenfu Cao, Xiaolei Dong
doaj   +1 more source

Inter-domain Identity-Based Proxy Re-encryption [PDF]

open access: yes, 2009
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only been devoted to the intra-domain setting, where the delegator and the delegatee are registered in the same domain. In this paper, we investigate the proxy re-encryption
Tang, Qiang   +2 more
openaire   +2 more sources

Resplittable threshold multi-broker proxy re-encryption scheme from lattices

open access: yesTongxin xuebao, 2017
Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the ...
Ju-yan LI, Chun-guang MA, Qian ZHAO
doaj   +2 more sources

A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme

open access: yesInformation, 2023
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine-
Tao Feng, Dewei Wang, Renbin Gong
doaj   +1 more source

Home - About - Disclaimer - Privacy