A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation
2017
Journal of Network and Computer Applications
This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from the functional and efficiency perspectives. Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to learn any information about the original message. Thus, it serves as a means for delegating
doi:10.1016/j.jnca.2017.03.005
fatcat:wlmfwffpwffnjhkopjuwg4yqfe