[HTML][HTML] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts

K Liang, CK Chu, X Tan, DS Wong, C Tang… - Theoretical Computer …, 2014 - Elsevier
Abstract Proxy Re-Encryption (PRE) allows one user to delegate the decryption rights of
his/her ciphertexts to another user. Since the introduction of Multi-Hop Identity-Based PRE …

Fully secure unidirectional identity-based proxy re-encryption

S Luo, Q Shen, Z Chen - International Conference on Information Security …, 2011 - Springer
Proxy re-encryption (PRE) allows the proxy to translate a ciphertext encrypted under Alice's
public key into another ciphertext that can be decrypted by Bob's secret key. Identity-based …

A CCA-secure identity-based conditional proxy re-encryption without random oracles

K Liang, Z Liu, X Tan, DS Wong, C Tang - Information Security and …, 2013 - Springer
Although a few unidirectional single-hop Identity-Based Proxy Re-Encryption (IBPRE)
systems are available in the literature, none of them is CCA secure in the standard model …

Identity-based proxy re-encryption schemes with multiuse, unidirection, and CCA security

J Shao, D Xing, Z Cao - Cryptology ePrint Archive, 2008 - eprint.iacr.org
A proxy re-encryption (PRE) scheme allows a proxy to transform a ciphertext under Alice's
public key into a ciphertext under Bob's public key on the same message. In 2006, Green …

Identity-based proxy re-encryption without random oracles

CK Chu, WG Tzeng - International Conference on Information Security, 2007 - Springer
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to
Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a …

Multi-use and unidirectional identity-based proxy re-encryption schemes

H Wang, Z Cao, L Wang - Information Sciences, 2010 - Elsevier
In a proxy re-encryption scheme, a semi-trusted proxy is given special power that allows it to
transform a ciphertext for Alice into a ciphertext for Bob without learning any information …

New constructions for identity-based unidirectional proxy re-encryption

JZ Lai, WT Zhu, RH Deng, SL Liu, WD Kou - Journal of Computer Science …, 2010 - Springer
We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-
key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a …

New identity-based proxy re-encryption schemes to prevent collusion attacks

L Wang, L Wang, M Mambo, E Okamoto - Pairing-Based Cryptography …, 2010 - Springer
In this paper, we propose two new constructions of identity-based proxy re-encryption (IB-
PRE). The most important feature of our schemes is that we no longer need the semi-trust …

Identity-based conditional proxy re-encryption with fine grain policy

C Ge, W Susilo, J Wang, L Fang - Computer Standards & Interfaces, 2017 - Elsevier
An identity-based conditional proxy re-encryption scheme (IB-CPRE) allows a semi-trusted
proxy to convert a ciphertext satisfying one condition, which is set by the delegator, under …

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption

J Shao, Z Cao - Information Sciences, 2012 - Elsevier
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption
(IBPRE), where a semi-trusted proxy with some information (aka re-encryption key), can …