M Green, G Ateniese - Applied Cryptography and Network Security: 5th …, 2007 - Springer
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been …
CK Chu, WG Tzeng - International Conference on Information Security, 2007 - Springer
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a …
H Liu, Y Ming, C Wang, Y Zhao - International Conference on Information …, 2023 - Springer
Proxy re-encryption, as a cryptographic primitive, allows an untrusted proxy to transform a ciphertext encrypted with the data owner's public key to a ciphertext encrypted with the …
J Shao, Z Cao - Information Sciences, 2012 - Elsevier
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption (IBPRE), where a semi-trusted proxy with some information (aka re-encryption key), can …
K Liang, Z Liu, X Tan, DS Wong, C Tang - Information Security and …, 2013 - Springer
Although a few unidirectional single-hop Identity-Based Proxy Re-Encryption (IBPRE) systems are available in the literature, none of them is CCA secure in the standard model …
S Luo, J Hu, Z Chen - Proceedings of the tenth annual ACM workshop …, 2010 - dl.acm.org
A proxy re-encryption (PRE) scheme involves three parties: Alice, Bob, and a proxy. PRE allows the proxy to translate a ciphertext encrypted under Alice's public key into one that can …
JJ Qiu, YS Lee, HJ Lee - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
In an identity-based proxy re-encryption (IB-PRE) scheme, a semi-trusted proxy can convert a ciphertext under Alice's identity into a ciphertext for Bob. The proxy does not know the …
J Zhang, XA Wang, X Yang - J. Comput., 2013 - Citeseer
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext computed under …
C Ge, W Susilo, J Wang, L Fang - Computer Standards & Interfaces, 2017 - Elsevier
An identity-based conditional proxy re-encryption scheme (IB-CPRE) allows a semi-trusted proxy to convert a ciphertext satisfying one condition, which is set by the delegator, under …