Results 221 to 230 of about 10,953 (251)
SPKSE: secure public key searchable encryption withstand keyword guessing attacks. [PDF]
Shi D, Xu M, Cao C, Cheng H.
europepmc +1 more source
Revocable and Traceable Decentralized ABE for P2P Networks. [PDF]
Gao D, Xu H, Qian S.
europepmc +1 more source
Compressive sensing techniques based on secure data aggregation in WSNs. [PDF]
Madkour ME +5 more
europepmc +1 more source
Categorical framework for quantum-resistant zero-trust AI security. [PDF]
Cherkaoui I, Clarke C, Horgan J, Dey I.
europepmc +1 more source
Non-Transferable Proxy Re-Encryption Scheme [PDF]
A proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (delegator) to a ciphertext for Bob (delegatee) without seeing the underlying plaintext. However, existing PRE schemes generally suffer from at least one of the followings.
Hui, CK, Yiu, SM, Chim, TW, He, Y
openaire +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Identity-based re-encryption scheme with lightweight re-encryption key generation
Journal of Discrete Mathematical Sciences and Cryptography, 2018Cryptographic proxy re-encryption is a very useful primitive which is capable of transforming a ciphertext under one public key PK1 into a new ciphertext under another public key PK2 without privat...
Liang Liu, Jun Ye
openaire +1 more source
2021
We put forward the notion of universal proxy re-encryption (UPRE). A UPRE scheme enables a proxy to convert a ciphertext under a (delegator) public key of any existing public-key encryption (PKE) scheme into another ciphertext under a (delegatee) public key of any existing PKE scheme (possibly different from the delegator one).
Döttling, Nico, Nishimaki, Ryo
openaire +1 more source
We put forward the notion of universal proxy re-encryption (UPRE). A UPRE scheme enables a proxy to convert a ciphertext under a (delegator) public key of any existing public-key encryption (PKE) scheme into another ciphertext under a (delegatee) public key of any existing PKE scheme (possibly different from the delegator one).
Döttling, Nico, Nishimaki, Ryo
openaire +1 more source
Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption
2011 Seventh International Conference on Computational Intelligence and Security, 2011Proxy re-encryption (PRE) allows a proxy to transform a cipher text for Alice (delegator) to be the one which can be decrypted by Bob (delegatee). Since it is introduced by Blaze et al. in 1998, many variants of PRE have been proposed. In this paper, we concentrate on two of them: anonymous conditional proxy re-encryption (ACPRE) and constrained proxy ...
WeiDong Zhong +3 more
openaire +1 more source

