Secure and efficient IBE-PKE proxy re-encryption

T Mizuno, H Doi - IEICE transactions on fundamentals of …, 2011 - search.ieice.org
In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext
encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext …

[HTML][HTML] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts

K Liang, CK Chu, X Tan, DS Wong, C Tang… - Theoretical Computer …, 2014 - Elsevier
Abstract Proxy Re-Encryption (PRE) allows one user to delegate the decryption rights of
his/her ciphertexts to another user. Since the introduction of Multi-Hop Identity-Based PRE …

ID-Based proxy re-encryption scheme with chosen-ciphertext security

WK Koo, JY Hwang, HJ Kim, DH Lee - Journal of the Institute of …, 2009 - koreascience.kr
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to
Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a …

Identity-based proxy re-encryption scheme using fog computing and anonymous key generation

HY Lin, TT Tsai, PY Ting, YR Fan - Sensors, 2023 - mdpi.com
In the fog computing architecture, a fog is a node closer to clients and responsible for
responding to users' requests as well as forwarding messages to clouds. In some medical …

Identity-based conditional proxy re-encryption without random oracles

JJ Qiu, YS Lee, HJ Lee - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
In an identity-based proxy re-encryption (IB-PRE) scheme, a semi-trusted proxy can convert
a ciphertext under Alice's identity into a ciphertext for Bob. The proxy does not know the …

Identity-based data storage in cloud computing

J Han, W Susilo, Y Mu - Future Generation Computer Systems, 2013 - Elsevier
Identity-based proxy re-encryption schemes have been proposed to shift the burden of
managing numerous files from the owner to a proxy server. Nevertheless, the existing …

On the security of two identity-based conditional proxy re-encryption schemes

K He, J Weng, RH Deng, JK Liu - Theoretical Computer Science, 2016 - Elsevier
Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a
delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn …

On the security of two multi-use CCA-secure proxy re-encryption schemes

J Zhang, XA Wang, Y Ding… - International Journal of …, 2013 - inderscienceonline.com
In proxy re-encryption (PRE), a semi-trusted proxy can convert a ciphertext originally
intended for Alice into one which can be decrypted by Bob, while the proxy cannot know the …

Hierarchical conditional proxy re-encryption: A new insight of fine-grained secure data sharing

K He, X Liu, H Yuan, W Wei, K Liang - Information Security Practice and …, 2017 - Springer
Outsource local data to remote cloud has become prevalence for Internet users to date.
While being unable to “handle”(outsourced) data at hand, Internet users may concern about …

Group delegated ID-based proxy re-encryption for PHR

WB Kim, IY Lee, KB Yim - Innovative Mobile and Internet Services in …, 2021 - Springer
In general, ID-based proxy re-encryption has the form of transferring data in a 1: 1 manner
between a data owner and data requestor. Therefore, only the data owner has the authority …