A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security

K Liang, L Fang, W Susilo… - 2013 5th international …, 2013 - ieeexplore.ieee.org
Cipher text-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) extends the traditional
Proxy Re-Encryption (PRE) by allowing a semi-trusted proxy to transform a cipher text under …

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

K Liang, MH Au, JK Liu, W Susilo, DS Wong… - Future Generation …, 2015 - Elsevier
Abstract Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data
owner to delegate the access rights of the encrypted data stored on a cloud storage system …

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

K Liang, JK Liu, DS Wong, W Susilo - … 7-11, 2014. Proceedings, Part I 19, 2014 - Springer
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate
verification process. However, revocation remains as a daunting task in terms of ciphertext …

A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

K Liang, MH Au, JK Liu, W Susilo… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
In this paper, for the first time, we define a general notion for proxy re-encryption (PRE),
which we call deterministic finite automata-based functional PRE (DFA-based FPRE) …

Cloud based data sharing with fine-grained proxy re-encryption

Y Yang, H Zhu, H Lu, J Weng, Y Zhang… - Pervasive and Mobile …, 2016 - Elsevier
Conditional proxy re-encryption (CPRE) enables fine-grained delegation of decryption
rights, and has many real-world applications. In this paper, we present a ciphertext-policy …

Public key encryption with delegated equality test in a multi-user setting

S Ma, M Zhang, Q Huang, B Yang - The Computer Journal, 2015 - ieeexplore.ieee.org
Probabilistic public key encryption with equality test (PKEET), introduced by Yang et al. in
CT-RSA 2010, is able to check whether two ciphertexts are encryptions of the same …

Key-private proxy re-encryption under LWE

Y Aono, X Boyen, LT Phong, L Wang - Progress in Cryptology …, 2013 - Springer
Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob
can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob …

Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage

L Jiang, D Guo - IEEE Access, 2017 - ieeexplore.ieee.org
Since Cloud Service Provider is a semi-trusted party in cloud storage, to protect data from
being disclosed, users' data are encrypted before being uploaded to a cloud server …

Revisiting proxy re-encryption: forward secrecy, improved security, and applications

D Derler, S Krenn, T Lorünser, S Ramacher… - … workshop on public key …, 2018 - Springer
We revisit the notion of proxy re-encryption (PRE PRE), an enhanced public-key encryption
primitive envisioned by Blaze et al.(E urocrypt'98) and formalized by Ateniese et …

Efficient fine-grained data sharing mechanism for electronic medical record systems with mobile devices

H Ma, R Zhang, G Yang, Z Song, K He… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Sharing digital medical records on public cloud storage via mobile devices facilitates
patients (doctors) to get (offer) medical treatment of high quality and efficiency. However …