Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes [PDF]
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh +3 more
doaj +2 more sources
A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing [PDF]
The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can ...
Juyan Li +3 more
doaj +2 more sources
Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme [PDF]
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic ...
Yongli Tang +4 more
doaj +2 more sources
End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption [PDF]
In light of the existing security vulnerabilities within IoT publish–subscribe systems, our study introduces an improved end-to-end encryption approach using conditional proxy re-encryption.
Shi Lin, Li Cui, Niu Ke
doaj +2 more sources
Revocable attribute-based proxy re-encryption [PDF]
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into ...
Luo Fucai, Al-Kuwari Saif
doaj +3 more sources
Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments [PDF]
As technology advances rapidly, a diverse array of Internet of Things (IoT) devices finds widespread application across numerous fields. The intelligent nature of these devices not only gives people more convenience, but also introduces new challenges ...
Han-Yu Lin, Pei-Ru Chen
doaj +2 more sources
Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products [PDF]
In today’s globalized agricultural system, information leakage of agricultural biological risk factors can lead to business risks and public panic, jeopardizing corporate reputation. To solve the above problems, this study constructs a blockchain network
Shaohua Wang +5 more
doaj +2 more sources
Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes [PDF]
Existing attribute-based proxy re-encryption schemes suffer from issues like complex access policies, large ciphertext storage space consumption, and an excessive authority of the authorization center, leading to weak security and controllability of data
Wenlong Yi +4 more
doaj +2 more sources
WGRe:a re-encryption anonymous tunnel
The universal re-encryption scheme URE and its extension EURE were reviewed,discovering their vulnerabilities to Pfitzmann attack.Then a novel re-encryption scheme WGRe(WonGoo Re-encryption) was proposed.WGRe could en-sure the correctness of the outputs ...
LU Tian-bo1 +3 more
doaj +3 more sources
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important ...
Shang LIU, Yinzhang GUO
doaj +3 more sources

