Hierarchical identity-based proxy re-encryption without random oracles

Y Ren, D Gu, S Wang, X Zhang - International Journal of …, 2010 - World Scientific
In a proxy re-encryption scheme, a semi-trusted proxy converts a ciphertext for Alice into a
ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been …

Fully secure unidirectional identity-based proxy re-encryption

S Luo, Q Shen, Z Chen - International Conference on Information Security …, 2011 - Springer
Proxy re-encryption (PRE) allows the proxy to translate a ciphertext encrypted under Alice's
public key into another ciphertext that can be decrypted by Bob's secret key. Identity-based …

Multi-use and unidirectional identity-based proxy re-encryption schemes

H Wang, Z Cao, L Wang - Information Sciences, 2010 - Elsevier
In a proxy re-encryption scheme, a semi-trusted proxy is given special power that allows it to
transform a ciphertext for Alice into a ciphertext for Bob without learning any information …

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption

J Shao, Z Cao - Information Sciences, 2012 - Elsevier
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption
(IBPRE), where a semi-trusted proxy with some information (aka re-encryption key), can …

Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption

K Liang, W Susilo, JK Liu, DS Wong - The Computer Journal, 2015 - academic.oup.com
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some
encrypted data stored on the cloud without revealing the data to an honest-but-curious cloud …

New constructions for identity-based unidirectional proxy re-encryption

JZ Lai, WT Zhu, RH Deng, SL Liu, WD Kou - Journal of Computer Science …, 2010 - Springer
We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-
key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a …

Identity-based conditional proxy re-encryption with fine grain policy

C Ge, W Susilo, J Wang, L Fang - Computer Standards & Interfaces, 2017 - Elsevier
An identity-based conditional proxy re-encryption scheme (IB-CPRE) allows a semi-trusted
proxy to convert a ciphertext satisfying one condition, which is set by the delegator, under …

Identity-based proxy re-encryption

M Green, G Ateniese - Applied Cryptography and Network Security: 5th …, 2007 - Springer
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a
ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been …

[PDF][PDF] Key-private identity-based proxy re-encryption

C Ge, J Xia, L Fang - Comput., Mater. Continua, 2020 - cdn.techscience.cn
An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to
convert an encryption under one identity to another without revealing the underlying …

Identity-based proxy re-encryption schemes with multiuse, unidirection, and CCA security

J Shao, D Xing, Z Cao - Cryptology ePrint Archive, 2008 - eprint.iacr.org
A proxy re-encryption (PRE) scheme allows a proxy to transform a ciphertext under Alice's
public key into a ciphertext under Bob's public key on the same message. In 2006, Green …