Results 21 to 30 of about 10,953 (251)

Non-transferable unidirectional proxy re-encryption scheme for secure social cloud storage sharing [PDF]

open access: yes, 2016
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Hao, Wei   +3 more
core   +1 more source

Conditional Privacy Using Re-encryption [PDF]

open access: yes2008 IFIP International Conference on Network and Parallel Computing, 2008
This paper proposes, for the first time, the use of re-encryption scheme to improve users privacy in a privacy-enhancing system. Firstly, a secure protocol to distribute a re-encryption key from a user A to a service provider B, with the help of n referees, is proposed.
Suriadi, Suriadi   +2 more
openaire   +2 more sources

Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server

open access: yesIEEE Access, 2017
An outsourcing re-encryption program can help a ciphertext owner (delegator) transform his/her ciphertext into another ciphertext of delegatee. For example, an e-mail receiver can re-transfer an encrypted e-mail to his secretary while allowing the e-mail
Mingwu Zhang   +3 more
doaj   +1 more source

Provably Secure Identity-based Conditional Proxy Re-encryption Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
The conditional proxy re-encryption based on the traditional public key cryptosystem is mature,but the Identity-based Proxy Re-encryption(IBPRE) scheme,controlling agents’ permissions from the fine-grained level is a problem needed to be solved.Thus,this
YE Weiwei,OU Qingyu,WEI Wei
doaj   +1 more source

Cost-effective secure e-health cloud system using identity based cryptographic techniques [PDF]

open access: yes, 2016
Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients.
Luo, Xiaoshuang   +4 more
core   +2 more sources

Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment

open access: yesIEEE Access, 2020
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of low latency, storage, and computing resources that serve IoT applications ...
Osama A. Khashan
doaj   +1 more source

Lattice-Based proof of a shuffle [PDF]

open access: yes, 2019
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes. Shuffles are commonly used to construct mixing networks (mix-nets), a key element to ensure anonymity in many applications such as electronic voting ...
Costa, Nuria   +2 more
core   +1 more source

Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application

open access: yesTongxin xuebao, 2021
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was ...
Ruiqi LI, Chunfu JIA, Yafei WANG
doaj   +2 more sources

Identity-based Searchable Encryption Scheme Supporting Proxy Re-encryption [PDF]

open access: yesJisuanji gongcheng, 2019
The existing Identity-based Encryption with Keyword Search (IBEKS) cannot share search permissions.Therefore,an Identity-based Proxy Re-encryption with Keyword Search (IBPKS) scheme in cloud environment is proposed.The identity-based encryption algorithm
ZHU Minhui,CHEN Yanli,HU Yuanyuan
doaj   +1 more source

Anonymous proxy re‐encryption

open access: yesSecurity and Communication Networks, 2011
ABSTRACTProxy re‐encryption (PRE) is a public key encryption that allows a semi‐trusted proxy with some information (a.k.a., re‐encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system.
Jun Shao, Peng Liu, Guiyi Wei, Yun Ling
openaire   +1 more source

Home - About - Disclaimer - Privacy