Time‐and‐ID‐Based Proxy Reencryption Scheme

K Mtonga, A Paul, S Rho - Journal of Applied Mathematics, 2014 - Wiley Online Library
Time‐and ID‐based proxy reencryption scheme is proposed in this paper in which a type‐
based proxy reencryption enables the delegator to implement fine‐grained policies with one …

A type-and-identity-based proxy re-encryption scheme and its application in healthcare

L Ibraimi, Q Tang, P Hartel, W Jonker - Secure Data Management: 5th …, 2008 - Springer
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right
from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme …

Multi-use and unidirectional identity-based proxy re-encryption schemes

H Wang, Z Cao, L Wang - Information Sciences, 2010 - Elsevier
In a proxy re-encryption scheme, a semi-trusted proxy is given special power that allows it to
transform a ciphertext for Alice into a ciphertext for Bob without learning any information …

Identity-based conditional proxy re-encryption

D Zhou, K Chen, S Liu, D Zheng - Chinese Journal of …, 2013 - ieeexplore.ieee.org
In a Idendity-based proxy re-encryption (IBPRE) scheme, a proxy, converts a ciphertext for
one identity into a ciphertext for another identity without knowing the underlying plaintext …

Inter-domain identity-based proxy re-encryption

Q Tang, P Hartel, W Jonker - International Conference on Information …, 2008 - Springer
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right
from one party (the delegator) to another (the delegatee). So far, research efforts have only …

[PDF][PDF] Key-private identity-based proxy re-encryption

C Ge, J Xia, L Fang - Comput., Mater. Continua, 2020 - cdn.techscience.cn
An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to
convert an encryption under one identity to another without revealing the underlying …

On the role of pkg for proxy re-encryption in identity based setting

X an Wang, X Yang, F Li - Cryptology ePrint Archive, 2008 - eprint.iacr.org
Abstract In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive
called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext …

Identity-based proxy re-encryption without random oracles

CK Chu, WG Tzeng - International Conference on Information Security, 2007 - Springer
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to
Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a …

Hierarchical identity-based proxy re-encryption without random oracles

Y Ren, D Gu, S Wang, X Zhang - International Journal of …, 2010 - World Scientific
In a proxy re-encryption scheme, a semi-trusted proxy converts a ciphertext for Alice into a
ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been …

[PDF][PDF] Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG.

J Zhang, XA Wang, X Yang - J. Comput., 2013 - jcomputers.us
In proxy re-encryption, a proxy can transform a ciphertext computed under A's public key into
one that can be opened under B's decryption key. In this paper, we focus on the the research …