A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A secure unidirectional proxy re-encryption using identity and secret key exchange
2009
Proceedings of the 47th Annual Southeast Regional Conference on - ACM-SE 47
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. ...
PRE should also be secure from signature re-usability, where unreliable proxies store and re-use the signatures without the authorization of the signature bearer. ...
PRE protocols capable of re-encrypting a message from Alice to Bob and then from Bob to Charlie are said to be a multi-hop or multi-use proxy [8, 2] . ...
doi:10.1145/1566445.1566478
dblp:conf/ACMse/Milgo09
fatcat:ynacguaje5cvzaatgaox75baoe
Secure Data Forwarding in Cloud Storage System by using UMIB Proxy
2011
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
In this paper we developed a secure distributed storage system by using (UMIB-PRE) Unidirectional and Multiuse Identity based proxy re encryption technique with decentralized erasure code. ...
The main theme of this UMIB proxy re encryption is to support encoding, storing and forwarding operations over encrypted data. ...
Multi-use is an important property for proxy re-encryptions. ...
doi:10.24297/ijct.v10i8.1472
fatcat:wt7llqwmsjgu5banzlh3pl4o44
Cryptanalysis of A Multi-use CCA-secure Proxy Re-encryption Scheme
2014
International Journal of Security and Its Applications
Proxy re-encryption (PRE) can be classified as single-hop PRE and multi-use PRE according to the times which the ciphertext is transformed. ...
But we also found that different with single-hop PRE, multi-use PRE without randomize encrypt key in its re-encryption algorithm could be vulnerable to attack. ...
Multi-Use-PRE Scheme Definition A multi-use unidirectional proxy re-encryption scheme is a tuple of algorithms (Key-Gen, ReKeyGen, Encrypt, ReEncrypt, Decrypt): − KeyGen(1 k )→(pk, sk):Taking as input ...
doi:10.14257/ijsia.2014.8.4.15
fatcat:3s6qkbfmbffxfoqjk4joh2o77m
Secure and efficient bi-directional proxy re-encyrption technique
2016
2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)
Proxy re-encryption plays a significant role in protecting data that are stored in semi-untrusted server. ...
To address this work present a Bidirectional Proxy Re-encryption scheme by adopting lattice based cryptography technique. ...
In [23] presented unidirectional and multiple usage Proxy Re-Encryption technique by adopting multi-linear map [24] considering strong multi-linear groups and address the issues of [14] in designing ...
doi:10.1109/iccicct.2016.7987923
fatcat:kuwqzcztjnaevari5x6cta74ee
Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
[chapter]
2014
Lecture Notes in Computer Science
At Eurocrypt 1998, Blaze, Bleumer and Strauss [7] presented a new primitive called Proxy Re-Encryption (PRE). ...
Second, based on Aono et al's paper [4] we have constructed unidirectional PRE which is also secure under master secret security model. Like [4], our scheme is also multi-use. ...
Cryptanalysis of the Aono et al's Unidirectional Proxy Re-Encryption Scheme
Aono et al's Unidirectional Proxy Re-Encryption Scheme In Indocrypt 2013, Aono et al [4] presented key private unidirectional ...
doi:10.1007/978-3-642-55032-4_58
fatcat:hijmwgex6jhjdcstgdk5fqrvna
Proxy Re-encryption Scheme based on New Multivariate Quadratic Assumptions
2013
Journal of Computers
The compactness and security of the algorithm illumined us in applying it in proxy re-encryption scheme. ...
In this paper, a novel unidirectional PRE scheme (NMQ-PRE) is constructed based on new multivariate quadratic assumptions. ...
And, there are single-hop(single-use) PRE and multi-hop(multi-use) PRE system, according to whether the delegatee can spread the ciphertext to another user. ...
doi:10.4304/jcp.8.12.3238-3242
fatcat:dxeg33yykbdalixtxsnwwpfyee
A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
2021
Sensors
The existing homomorphic proxy re-encryption schemes use key switching algorithms to generate re-encryption keys, so it can not resist strong collusion attack. ...
The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. ...
[44, 45] constructed a single-hop homomorphic proxy re-encryption via key homomorphic computation and obtained a multi-hop proxy re-encryption using a branching program. Li et al. ...
doi:10.3390/s21010288
pmid:33406662
fatcat:6a75kznlbzdrvn6uzxgvfnovju
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation
2017
Journal of Network and Computer Applications
Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to learn any information about ...
Finally, we discuss some applications of proxy re-encryption, with a focus on secure access delegation in the cloud. ...
The multi-use property is achieved using an expansive construction, so ciphertexts grow on each re-encryption. ...
doi:10.1016/j.jnca.2017.03.005
fatcat:wlmfwffpwffnjhkopjuwg4yqfe
Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography)
2019
Indonesian Journal of Electrical Engineering and Computer Science
To provide the security several Proxy re-encryption scheme has been introduced, however all these method lacks of efficiency. ...
Hence In this paper, we propose a scheme known as ALBC (Adaptive Lattice Based Cryptography), this scheme follows the two phase i.e. encryption and Re-encryption. ...
In [12] , unidirectional as well as multi-use PRE scheme has been proposed, these scheme are based on the multi-linear maps. ...
doi:10.11591/ijeecs.v16.i3.pp1455-1463
fatcat:emujamnsabgotcxk5pg4ry4mrq
Improved Data Security Protection Mechanism for Cloud Storage using Two Factors
2017
IJARCCE
This system proposed an improve data security protection mechanism for cloud using two components. In this system sender sends an encrypted message to a receiver with the help of cloud system. ...
That makes the encryption process more complicated. ...
and collusionresistant multi-use unidirectional IDbased proxy re-encryption MUIBPRE. ...
doi:10.17148/ijarcce.2017.6505
fatcat:7onrbz5anfagtpycvojyxzqy54
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
2010
Science China Information Sciences
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss in Eurocrypt'98, allows a semitrusted proxy to convert a ciphertext originally intended for Alice into an encryption of the same message ...
Unidirectional chosen-ciphertext secure proxy re-encryption. http://hal.inria.fr/inria-00339530/en/. This is the extended version of [5]. 3 Zhang, X, Chen, M.R, Li, X. ...
Chow, Cheng-Kang Chu and Junzuo Lai for the helpful discussions on the topic of proxy re-encryption. ...
doi:10.1007/s11432-010-0047-3
fatcat:knvhng6yu5b3pfsagp23hknkma
Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server
2017
IEEE Access
For a multi-hop re-encryption, the delegatee can re-encrypt the ciphertext to another user in delegation chain, repeatedly. ...
However, the proxy or outsourcing server needs a re-encryption key (i.e., re-key) and the re-encryption program must execute in a black-box manner (cannot trace into or debug and monitor the program), ...
In order to obtain the multi-hop and unidirectional re-encryption, we use the multilinear map to obtain delegation depth control. ...
doi:10.1109/access.2017.2771335
fatcat:i2berlgkmvfjlf4nuzujyec2ji
Privacy-Preserving Protocol in Multi-User Cloud
2017
International Journal of Computer Applications
In this paper, we propose a privacy preserving query protocol based on proxy re-encryption schemes. The proposed protocol protects data privacy of all users in a multi-user cloud setting. ...
In bidirectional proxy function both Alice and Bob can decrypt the ciphertext of each other using the same bidirectional proxy function while in unidirectional they need to use completely different functions ...
The proxy function could be: unidirectional or bidirectional. ...
doi:10.5120/ijca2017915620
fatcat:2ur3riw6g5ejxmrp3q5s3o7g5u
Identity Based Proxy Re-encryption Scheme under LWE
2017
KSII Transactions on Internet and Information Systems
The proxy re-encryption allows an intermediate proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the original message and leaking out relevant information. ...
Unlike many prior identity based proxy re-encryption schemes which are based on the number theoretic assumptions such as large integer factorization and discrete logarithm problem. ...
Preliminaries
Identity-Based Unidirectional Proxy Re-encryption Scheme (IB-uPRE) An Identity-Based unidirectional proxy re-encryption scheme is a tuple of algorithms- ( A proxy re-encryption system ...
doi:10.3837/tiis.2017.12.023
fatcat:4wywttapvrhyfn72dosc7ylmie
RSA-TBOS signcryption with proxy re-encryption
2008
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
Our scheme is Weak-IND-CCA2 secure, unidirectional, extensible to multi-use and does not use bilinear maps. ...
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. ...
The central idea behind the conversion to a multi-use scheme is that of proxy re-encryption of the ReKey. ...
doi:10.1145/1456520.1456531
dblp:conf/drm/KirtaneR08
fatcat:iziaoirr5rcxxlrfqgfd4zycja
« Previous
Showing results 1 — 15 out of 678 results