Results 241 to 250 of about 10,953 (251)
Some of the next articles are maybe not open access.

Multi-Use Conditional Proxy Re-encryption

2013 International Conference on Information Science and Cloud Computing Companion, 2013
In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an encrypted mails sent to her, which contains a specific word and satisfies the condition set on the proxy by Alice, and Bob also can ...
Lequn Mo, Guoxiang Yao
openaire   +1 more source

Proxy Re-encryption

2021
Jian Weng, Junzuo Lai
openaire   +1 more source

Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption

2015
In this paper, we introduce a new functionality for proxy re-encryption (PRE) that we call re-encryption verifiability. In a PRE scheme with re-encryption verifiability (which we simply call verifiable PRE, or VPRE), a receiver of a re-encrypted ciphertext can verify whether the received ciphertext is correctly transformed from an original ciphertext ...
Satsuya Ohata   +4 more
openaire   +1 more source

Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019
Yutaka KAWAI   +4 more
openaire   +1 more source

Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption

2015
In this paper, we introduce a new proxy re-encryption (PRE) in that the re-encryption key generation can be outsourced, in attribute-based encryption. We call this new notion flexible ciphertext-policy attribute-based proxy re-encryption (flexible CP-AB-PRE). In ordinary PRE scheme, re-encryption keys are generated by using user’s decryption key and an
openaire   +1 more source

Anonymous ID-Based Proxy Re-Encryption

2012
ID-based proxy re-encryption (IBPRE) allows a proxy with some information (a.k.a. re-encryption key) to transform the ciphertext under one identity to another ciphertext under another identity. These two ciphertexts can yield the same plaintext, while the proxy cannot get any information of the plaintext.
openaire   +1 more source

Unidirectional proxy re-encryption

2012
Susan R. Hohenberger   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy