[PDF][PDF] Key-private identity-based proxy re-encryption

C Ge, J Xia, L Fang - Comput., Mater. Continua, 2020 - cdn.techscience.cn
An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to
convert an encryption under one identity to another without revealing the underlying …

Fully secure unidirectional identity-based proxy re-encryption

S Luo, Q Shen, Z Chen - International Conference on Information Security …, 2011 - Springer
Proxy re-encryption (PRE) allows the proxy to translate a ciphertext encrypted under Alice's
public key into another ciphertext that can be decrypted by Bob's secret key. Identity-based …

Anonymous ID-based proxy re-encryption

J Shao - Australasian Conference on Information Security and …, 2012 - Springer
ID-based proxy re-encryption (IBPRE) allows a proxy with some information (aka re-
encryption key) to transform the ciphertext under one identity to another ciphertext under …

Identity-based conditional proxy re-encryption

D Zhou, K Chen, S Liu, D Zheng - Chinese Journal of …, 2013 - ieeexplore.ieee.org
In a Idendity-based proxy re-encryption (IBPRE) scheme, a proxy, converts a ciphertext for
one identity into a ciphertext for another identity without knowing the underlying plaintext …

Inter-domain identity-based proxy re-encryption

Q Tang, P Hartel, W Jonker - International Conference on Information …, 2008 - Springer
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right
from one party (the delegator) to another (the delegatee). So far, research efforts have only …

Identity-based proxy re-encryption schemes with multiuse, unidirection, and CCA security

J Shao, D Xing, Z Cao - Cryptology ePrint Archive, 2008 - eprint.iacr.org
A proxy re-encryption (PRE) scheme allows a proxy to transform a ciphertext under Alice's
public key into a ciphertext under Bob's public key on the same message. In 2006, Green …

New identity-based proxy re-encryption schemes to prevent collusion attacks

L Wang, L Wang, M Mambo, E Okamoto - Pairing-Based Cryptography …, 2010 - Springer
In this paper, we propose two new constructions of identity-based proxy re-encryption (IB-
PRE). The most important feature of our schemes is that we no longer need the semi-trust …

New constructions for identity-based unidirectional proxy re-encryption

JZ Lai, WT Zhu, RH Deng, SL Liu, WD Kou - Journal of Computer Science …, 2010 - Springer
We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-
key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a …

Collusion-resistant identity-based proxy re-encryption without random oracles

JJ Qiu, JB Jo, HJ Lee - International Journal of Security and Its …, 2015 - earticle.net
In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a
ciphertext under Alice's public identity into a ciphertext for Bob. The proxy does not know the …

Multi-use and unidirectional identity-based proxy re-encryption schemes

H Wang, Z Cao, L Wang - Information Sciences, 2010 - Elsevier
In a proxy re-encryption scheme, a semi-trusted proxy is given special power that allows it to
transform a ciphertext for Alice into a ciphertext for Bob without learning any information …