Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme …
H Wang, Z Cao, L Wang - Information Sciences, 2010 - Elsevier
In a proxy re-encryption scheme, a semi-trusted proxy is given special power that allows it to transform a ciphertext for Alice into a ciphertext for Bob without learning any information …
D Zhou, K Chen, S Liu, D Zheng - Chinese Journal of …, 2013 - ieeexplore.ieee.org
In a Idendity-based proxy re-encryption (IBPRE) scheme, a proxy, converts a ciphertext for one identity into a ciphertext for another identity without knowing the underlying plaintext …
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only …
C Ge, J Xia, L Fang - Comput., Mater. Continua, 2020 - cdn.techscience.cn
An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying …
X an Wang, X Yang, F Li - Cryptology ePrint Archive, 2008 - eprint.iacr.org
Abstract In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext …
CK Chu, WG Tzeng - International Conference on Information Security, 2007 - Springer
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a …
Y Ren, D Gu, S Wang, X Zhang - International Journal of …, 2010 - World Scientific
In a proxy re-encryption scheme, a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been …
J Zhang, XA Wang, X Yang - J. Comput., 2013 - jcomputers.us
In proxy re-encryption, a proxy can transform a ciphertext computed under A's public key into one that can be opened under B's decryption key. In this paper, we focus on the the research …