Filters








102 Hits in 3.6 sec

Threshold Delegation Scheme Based on Multi-Proxy Re-Encryption

You-Jin Song
2016 International Journal of Security and Its Applications  
This study defines a multi-proxy re-encryption technique based on quorum-controlled asymmetric PRE combined with a proxy that exceeds a threshold.  ...  Security weakness against collusion between proxy and delegatee can be prvented by applying such a technique, and re-encryption control by multi-proxy becomes possible.  ...  After each proxy computes , the ( ) value is restored through the set of quorum servers with more than threshold k.  ... 
doi:10.14257/ijsia.2016.10.7.31 fatcat:v3tsykq5zngsrhpdehddjcqova

A Proxy-Based Encrypted Online Social Network With Fine-Grained Access [article]

Fabian Schillinger, Christian Schindelhauer
2020 arXiv   pre-print
Shared information and circles are encrypted and the keys can be distributed by proxies.  ...  When a user wants to access content c, the server re-encrypts it. For the re-encryption procedure the server generates two random numbers s and t.  ...  PROPOSED ONLINE SOCIAL NETWORK For the encryption of small content the asymmetric scheme of Elgamal [13] is used.  ... 
arXiv:2010.03860v1 fatcat:homwip6aofbmxc4dp72pervqyu

Group-Based Proxy Re-encryption Scheme [chapter]

Chunbo Ma, Jun Ao
2009 Lecture Notes in Computer Science  
Recently, proxy re-encryption scheme received much attention. In this paper, we propose a proxy re-encryption used for divert ciphertext from one group to another.  ...  The scheme is bidirectional and any member can independently decrypt the ciphertexts encrypted to its group.  ...  There are some other re-encryption schemes, such as Jakobsson's quorum controlled asymmetric proxy re-encryption [7] , and the identity-based scheme presented by Green and Ateniese [8] .  ... 
doi:10.1007/978-3-642-04070-2_108 fatcat:hbzqrnz4xvdmtk4x3gusp7ynpa

Sharing Data Homomorphically Encrypted with Different Encryption Keys [article]

Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwénolé Quellec, Michel Cozic
2017 arXiv   pre-print
In this paper, we propose the first homomorphic based proxy re-encryption (HPRE) solution that allows different users to share data they outsourced homomorphically encrypted using their respective public  ...  Based on our solution for comparing encrypted data, the cloud computes in clear the differences in-between the encrypted noise and the encrypted data of the delegator, obtaining thus blinded data.  ...  For instance, [3] take advantage of a quorum-based protocol which stands on distributed proxies, each of them possesses a part of the data of Alice but receive a different re-encryption key independent  ... 
arXiv:1706.01756v1 fatcat:ticvci2adranhpnbvuyu4bkr6a

Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records

Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker
2010 International Journal of Computational Models and Algorithms in Medicine  
Recent proposals on enforcing access control policies exploit the use of encryption techniques to enforce access control policies.  ...  In this paper we propose a new encryption technique called a type-and-identity-based proxy reencryption scheme which is suitable to be used in the healthcare setting.  ...  Jacobsson [14] addresses this "problem" using a quorum controlled asymmetric proxy reencryption where the Proxy is implemented with multiple servers and each of them performs partial re-encryption.  ... 
doi:10.4018/jcmam.2010040101 fatcat:sdcgkt24tjf5rc5ovxxknotaru

Time Constraint Delegation for P2P Data Decryption [chapter]

Tie-Yan Li
2004 Lecture Notes in Computer Science  
Large amount of digital content would be stored safely in peer-topeer network, with encrypted format.  ...  Zhou Jianying for discussion on Hash chain and applications. I Also thank the anonymous referees for their helpful reviews.  ...  Compensating [7] where only symmetric proxy functions were given, [8] proposed asymmetric proxy functions under quorum controlled.  ... 
doi:10.1007/978-3-540-39881-3_16 fatcat:krhnmslqancdzirslv4vqryyxa

Security Problems of Platform-as-a-Service (PaaS) Clouds and Practical Solutions to the Problems

Mehmet Tahir Sandikkaya, Ali Emre Harmanci
2012 2012 IEEE 31st Symposium on Reliable Distributed Systems  
This paper particularly focuses on the Platform-as-a-Service (PaaS) clouds.  ...  Security of PaaS clouds is considered from multiple perspectives including access control, privacy and service continuity while protecting both the service provider and the user.  ...  The corresponding symmetric key can be encrypted with the asymmetric key of the authorized user and it can be attached to the object.  ... 
doi:10.1109/srds.2012.84 dblp:conf/srds/SandikkayaH12 fatcat:4bgaojzkgbgkdguv7nveekxnsa

Architecture For Data Management

Marko Vukolic
2015 Zenodo  
Proxy re-encryption Proxy re-encryption [43] (PRE) allows a user to delegatee his/her decryption capability in case of unavailability.  ...  We here focus on single-hop unidirectional proxy re-encryption (UPRE) as it is the most relevant one in our context.  ... 
doi:10.5281/zenodo.49788 fatcat:5oup2d7sk5dm7efj77pjvg2bru

Scalable security and accounting services for content-based publish/subscribe systems

Himanshu Khurana
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
As illustrated in Figure 5 we then use the "asymmetric" nature of Jakobsson's proxy re-encryption scheme to establish transformation chains that allow an event to go through multiple PSASs.  ...  Based on broker requests, PSAS transforms packages encrypted with publishers' public keys into packages encrypted with subscribers' public keys using the proxy re-encryption scheme of [16] .  ...  For all j ∈ Q, Pj is replaced if one of the following equations is not satisfied: Gj = g δ j z 1 1 j z 2 2 j , Hj = h δ jz 1  ... 
doi:10.1145/1066677.1066862 dblp:conf/sac/Khurana05 fatcat:3wsnv5pzyfeq5odnp7i74cwvpy

Improved proxy re-encryption schemes with applications to secure distributed storage

Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
2006 ACM Transactions on Privacy and Security  
divided into subcomponents, each controlling a share of the re-encryption key.  ...  Performance measurements of our experimental file system demonstrate that proxy re-encryption can work effectively in practice. • 3 Jakobsson [1999] developed a quorum-based protocol where the proxy is  ...  There are a mere two proxy re-encryption RPCs (one for the root and one for the file).  ... 
doi:10.1145/1127345.1127346 fatcat:jhgnpsabqncqjh5hkoaid27h2y

Targeted Advertising ... and Privacy Too [chapter]

Ari Juels
2001 Lecture Notes in Computer Science  
Quorum-controlled asymmetric proxy re-encryption: This is a threshold algorithm enabling an El Gamal ciphertext encrypted under public key y to be re-encrypted under a new public key y ′ .  ...  Servers mix U 1 to obtain a vector U 2 of the form (E y [σ(j)], E y [ad The servers apply quorum-controlled asymmetric proxy re-encryption to obtain E yC [ad r ]. They send this to C. 5.  ...  An alternative is to encrypt ads using an enveloping scheme involving both asymmetric and symmetric encryption.  ... 
doi:10.1007/3-540-45353-9_30 fatcat:vu7gjm7r3fei5m4cxc4d47gsyu

Type-Based Proxy Re-encryption and Its Construction [chapter]

Qiang Tang
2008 Lecture Notes in Computer Science  
As a result, type-based proxy re-encryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy.  ...  Recently, the concept of proxy re-encryption has been shown very useful in a number of applications, especially in enforcing access control policies.  ...  We have the following observations on the existing proxy re-encryption schemes and their applications.  ... 
doi:10.1007/978-3-540-89754-5_11 fatcat:k37i2v2edbevxb7qby6n3i4fyi

Secure Data Sharing and Processing in Heterogeneous Clouds

Bojan Suzic, Andreas Reiter, Florian Reimair, Daniele Venturi, Baldur Kubo
2015 Procedia Computer Science  
In this work we focus on the federation of private clouds and the approaches that enable secure data sharing and processing among the collaborating infrastructures and services of public entities.  ...  We investigate the aspects of access control, data and security policy languages, as well as cryptographic approaches that enable fine-grained security and data processing in semi-trusted environments.  ...  This issue has been addressed by Jakobsson (1999) with an asymmetric proxy re-encryption schema under quorum control, as long as there is no dishonest quorum.  ... 
doi:10.1016/j.procs.2015.09.228 fatcat:yfre4npnhrgfri4gnx3mymv2ze

Secure Overlay Cloud Storage with Access Control and Assured Deletion

Yang Tang, Patrick P.C. Lee, John C.S. Lui, Radia Perlman
2012 IEEE Transactions on Dependable and Secure Computing  
We implement a proof-of-concept prototype of FADE atop Amazon S3, one of today's cloud storage services.  ...  We design and implement FADE, a secure overlay cloud storage system that achieves fine-grained, policy-based access control and file assured deletion.  ...  For example, in [39] , there is a semi-trustable on-line proxy server, in which data is re-encrypted with new keys upon attribute revocation. In FADE, each policy is associated with two keys.  ... 
doi:10.1109/tdsc.2012.49 fatcat:klgen7ygcvbzzkdq2tmkraysnq

Specification Of Security Enablers For Data Management

Marko Vukolic
2016 Zenodo  
More specifically, the first part of this deliverable focuses on novel solutions for state-machine replication.  ...  Finally, the third part describes advanced data security components, focusing, in particular on data privacy techniques.  ...  Proxy Re-Encryption. Based on (hash) ElGamal, Blaze et al.  ... 
doi:10.5281/zenodo.263831 fatcat:ksk4ze2tuncfbexjzsorjnoabe
« Previous Showing results 1 — 15 out of 102 results