Results 241 to 250 of about 10,953 (251)
Some of the next articles are maybe not open access.
Multi-Use Conditional Proxy Re-encryption
2013 International Conference on Information Science and Cloud Computing Companion, 2013In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an encrypted mails sent to her, which contains a specific word and satisfies the condition set on the proxy by Alice, and Bob also can ...
Lequn Mo, Guoxiang Yao
openaire +1 more source
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption
2015In this paper, we introduce a new functionality for proxy re-encryption (PRE) that we call re-encryption verifiability. In a PRE scheme with re-encryption verifiability (which we simply call verifiable PRE, or VPRE), a receiver of a re-encrypted ciphertext can verify whether the received ciphertext is correctly transformed from an original ciphertext ...
Satsuya Ohata +4 more
openaire +1 more source
Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019Yutaka KAWAI +4 more
openaire +1 more source
Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
2022Xiaolei Wang, Yang Wang, Mingqiang Wang
openaire +1 more source
2015
In this paper, we introduce a new proxy re-encryption (PRE) in that the re-encryption key generation can be outsourced, in attribute-based encryption. We call this new notion flexible ciphertext-policy attribute-based proxy re-encryption (flexible CP-AB-PRE). In ordinary PRE scheme, re-encryption keys are generated by using user’s decryption key and an
openaire +1 more source
In this paper, we introduce a new proxy re-encryption (PRE) in that the re-encryption key generation can be outsourced, in attribute-based encryption. We call this new notion flexible ciphertext-policy attribute-based proxy re-encryption (flexible CP-AB-PRE). In ordinary PRE scheme, re-encryption keys are generated by using user’s decryption key and an
openaire +1 more source
Anonymous ID-Based Proxy Re-Encryption
2012ID-based proxy re-encryption (IBPRE) allows a proxy with some information (a.k.a. re-encryption key) to transform the ciphertext under one identity to another ciphertext under another identity. These two ciphertexts can yield the same plaintext, while the proxy cannot get any information of the plaintext.
openaire +1 more source

