[PDF][PDF] Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG.

J Zhang, XA Wang, X Yang - J. Comput., 2013 - jcomputers.us
In proxy re-encryption, a proxy can transform a ciphertext computed under A's public key into
one that can be opened under B's decryption key. In this paper, we focus on the the research …

Identity-based proxy re-encryption

M Green, G Ateniese - Applied Cryptography and Network Security: 5th …, 2007 - Springer
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a
ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been …

Identity-based proxy re-encryption without random oracles

CK Chu, WG Tzeng - International Conference on Information Security, 2007 - Springer
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to
Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a …

Identity-Based Proxy Re-encryption Based on SM9

H Liu, Y Ming, C Wang, Y Zhao - International Conference on Information …, 2023 - Springer
Proxy re-encryption, as a cryptographic primitive, allows an untrusted proxy to transform a
ciphertext encrypted with the data owner's public key to a ciphertext encrypted with the …

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption

J Shao, Z Cao - Information Sciences, 2012 - Elsevier
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption
(IBPRE), where a semi-trusted proxy with some information (aka re-encryption key), can …

A CCA-secure identity-based conditional proxy re-encryption without random oracles

K Liang, Z Liu, X Tan, DS Wong, C Tang - Information Security and …, 2013 - Springer
Although a few unidirectional single-hop Identity-Based Proxy Re-Encryption (IBPRE)
systems are available in the literature, none of them is CCA secure in the standard model …

New construction of identity-based proxy re-encryption

S Luo, J Hu, Z Chen - Proceedings of the tenth annual ACM workshop …, 2010 - dl.acm.org
A proxy re-encryption (PRE) scheme involves three parties: Alice, Bob, and a proxy. PRE
allows the proxy to translate a ciphertext encrypted under Alice's public key into one that can …

Identity-based conditional proxy re-encryption without random oracles

JJ Qiu, YS Lee, HJ Lee - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
In an identity-based proxy re-encryption (IB-PRE) scheme, a semi-trusted proxy can convert
a ciphertext under Alice's identity into a ciphertext for Bob. The proxy does not know the …

[PDF][PDF] Identity Based Proxy Re-encryption From BB1 IBE.

J Zhang, XA Wang, X Yang - J. Comput., 2013 - Citeseer
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy
re-encryption. In proxy re-encryption, a proxy can transform a ciphertext computed under …

Identity-based conditional proxy re-encryption with fine grain policy

C Ge, W Susilo, J Wang, L Fang - Computer Standards & Interfaces, 2017 - Elsevier
An identity-based conditional proxy re-encryption scheme (IB-CPRE) allows a semi-trusted
proxy to convert a ciphertext satisfying one condition, which is set by the delegator, under …