Results 231 to 240 of about 10,953 (251)
Some of the next articles are maybe not open access.
Proxy Re-encryption with Unforgeable Re-encryption Keys
2014Proxy re-encryption PRE provides nice solutions to the delegation of decryption rights. In proxy re-encryption, the delegator Alice generates re-encryption keys for a semi-trusted proxy, with which the proxy can translate a ciphertext intended for Alice into a ciphertext for the delegatee Bob of the same plaintext.
Hui Guo, Zhenfeng Zhang, Jiang Zhang
openaire +1 more source
Generally Hybrid Proxy Re-Encryption
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016Proxy Re-Encryption (PRE) is a favorable primitive to realize a cryptographic cloud with secure and flexible data sharing mechanism. A number of PRE schemes with versatile capabilities have been proposed for different applications. The secure data sharing can be internally achieved in each PRE scheme.
Peng Xu +5 more
openaire +1 more source
2014
Among the variants of public key encryption schemes, the proxy re-encryption primitive (PRE) allows a user, say Alice, to decide that a delegate, say Bob, will be able to read her private messages. This is made possible thanks to a third party, the proxy, which is given a re-encryption key to transform a ciphertext intended to Alice into one intended ...
Sébastien Canard, Julien Devigne
openaire +1 more source
Among the variants of public key encryption schemes, the proxy re-encryption primitive (PRE) allows a user, say Alice, to decide that a delegate, say Bob, will be able to read her private messages. This is made possible thanks to a third party, the proxy, which is given a re-encryption key to transform a ciphertext intended to Alice into one intended ...
Sébastien Canard, Julien Devigne
openaire +1 more source
Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
2011Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted for Alice (delegator) into a ciphertext for Bob (delegatee) by using a re-encryption key generated by Alice. In PRE, non-transferability is a desirable property that colluding proxies and delegatees cannot re-delegate decryption rights to a malicious user.
Ryotaro Hayashi +4 more
openaire +1 more source
Fuzzy conditional proxy re-encryption
Science China Information Sciences, 2012Weng et al. introduced the notion of conditional proxy re-encryption (C-PRE), whereby only the ciphertext satisfying one condition set by Alice can be re-encrypted by the proxy. To achieve more fine-grained delegation on the condition set, we introduce a new cryptographic primitive called fuzzy conditional proxy re-encryption (FC-PRE) in which we view ...
LiMing Fang +3 more
openaire +1 more source
Adaptively Secure Proxy Re-encryption
2019A proxy re-encryption (PRE) scheme is a public-key encryption scheme that allows the holder of a key pk to derive a re-encryption key for any other key pk′. This re-encryption key lets anyone transform ciphertexts under pk into ciphertexts under pk′ without having to know the underlying message, while transformations from pk′to pk should not be ...
Fuchsbauer, Georg +3 more
openaire +2 more sources
2011 Seventh International Conference on Computational Intelligence and Security, 2011
The traditional proxy re-encryption (PRE) or conditional proxy re-encryption (CPRE) can re-encrypt infinite times on the delegator's cipher text. However many practical applications do not need this property, they prefer the delegator can control on the times the proxy can re-encrypt.
Xu An Wang +3 more
openaire +1 more source
The traditional proxy re-encryption (PRE) or conditional proxy re-encryption (CPRE) can re-encrypt infinite times on the delegator's cipher text. However many practical applications do not need this property, they prefer the delegator can control on the times the proxy can re-encrypt.
Xu An Wang +3 more
openaire +1 more source
Hierarchical conditional proxy re-encryption
Computer Standards & Interfaces, 2012In this paper, we introduce a new primitive called hierarchical conditional proxy re-encryption (HC-PRE) that enhances the concept of C-PRE by allowing more general re-encryption key delegation patterns. Hierarchical conditional proxy re-encryption (HC-PRE) scheme is the hierarchical extension of conditional proxy re-encryption (C-PRE) where the ...
Fang, Liming +3 more
openaire +2 more sources
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing
2011Proxy re-encryption is a cryptographic primitive enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice (delegator) into an encryption of the same message for Bob (delegatee). Proxy re-encryption is a useful tool, having many applications. However, we observe that the issue of re-encryption key leakage, where
Yanjiang Yang, Liang Gu, Feng Bao
openaire +1 more source
Elliptic Curve Based Proxy Re-Encryption
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016Proxy re-encryption is a scheme where a semi-trusted proxy alters the confidential message of one party into a confidential message of another party without knowing the original plaintext. To do the same, various approaches are suggested in the public key set up cryptography.
V. Thangam, K. Chandrasekaran
openaire +1 more source

