Results 11 to 20 of about 10,953 (251)

Securely Obfuscating Re-encryption [PDF]

open access: yesJournal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hohenberger, Susan   +3 more
openaire   +1 more source

A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare [PDF]

open access: yes, 2008
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee).
Hartel, Pieter   +3 more
core   +12 more sources

CLAP-PRE: Certificateless Autonomous Path Proxy Re-Encryption for Data Sharing in the Cloud

open access: yesApplied Sciences, 2022
In e-health systems, patients encrypt their personal health data for privacy purposes and upload them to the cloud. There exists a need for sharing patient health data with doctors for healing purposes in one’s own preferred order.
Chengdong Ren   +4 more
doaj   +1 more source

A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme [PDF]

open access: yesJournal of the Korea Institute of Information Security and Cryptology, 2013
Proxy re-encryption scheme has advantage where plaintext does not get exposed during re-encryption process. This scheme is popular for sharing server-saved data in case of cloud computing or mobile office that uses server to save data. Since previous proxy re-encryption schemes can use re-encryption key over and over again, it may abuse re-encryption ...
Junggab Son, Heekuck Oh, SangJin Kim
openaire   +1 more source

ODIN: Obfuscation-based privacy-preserving consensus algorithm for Decentralized Information fusion in smart device Networks [PDF]

open access: yes, 2017
The large spread of sensors and smart devices in urban infrastructures are motivating research in the area of the Internet of Things (IoT) to develop new services and improve citizens’ quality of life.
Ambrosin, Moreno   +3 more
core   +3 more sources

Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing

open access: yesApplied Sciences, 2022
Cloud computing has become popular in data sharing mainly because it has huge storage capacity and computing power. Securing the privacy of sensitive data for cloud-based data sharing is vital. Currently, there are various conditional proxy re-encryption
Huidan Hu   +3 more
doaj   +1 more source

Key-Private Proxy Re-encryption [PDF]

open access: yes, 2009
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very least, the proxy should not be able to learn the keys
ATENIESE, GIUSEPPE   +2 more
openaire   +1 more source

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]

open access: yes, 2009
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert   +15 more
core   +5 more sources

Identity based proxy re-encryption scheme (IBPRE+) for secure cloud data sharing [PDF]

open access: yes, 2016
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Nie, Jinting   +3 more
core   +1 more source

PRE+: dual of proxy re-encryption for secure cloud data sharing service [PDF]

open access: yes, 2018
With the rapid development of very large, diverse, complex, and distributed datasets generated from internet transactions, emails, videos, business information systems, manufacturing industry, sensors and internet of things etc., cloud and big data ...
Fatos Xhafa   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy