Searchable attribute-based mechanism with efficient data sharing for secure cloud storage

K Liang, W Susilo - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
To date, the growth of electronic personal data leads to a trend that data owners prefer to
remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

K Liang, MH Au, JK Liu, W Susilo, DS Wong… - Future Generation …, 2015 - Elsevier
Abstract Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data
owner to delegate the access rights of the encrypted data stored on a cloud storage system …

White-box security notions for symmetric encryption schemes

C Delerablée, T Lepoint, P Paillier, M Rivain - Selected Areas in …, 2014 - Springer
White-box cryptography has attracted a growing interest from researchers in the last decade.
Several white-box implementations of standard block-ciphers (DES, AES) have been …

Accountable proxy re-encryption for secure data sharing

H Guo, Z Zhang, J Xu, N An… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Proxy re-encryption (PRE) provides a promising solution for encrypted data sharing in public
cloud. When data owner Alice is going to share her encrypted data with data consumer Bob …

[PDF][PDF] Research Online

VNT Le, B Apopei, K Alameh - Sciences, 2018 - academia.edu
Abstract© The Institution of Engineering and Technology 2019. The modulus switching
technique has been used in some cryptographic applications as well as in cryptanalysis. For …

Lattice-based HRA-secure attribute-based proxy re-encryption in standard model

W Susilo, P Dutta, DH Duong, PS Roy - … 4–8, 2021, Proceedings, Part II 26, 2021 - Springer
Abstract Proxy re-encryption (PRE), introduced by Blaze, Bleumer, and Strauss at
EUROCRYPT 98, offers delegation of decryption rights, ie, it securely enables the re …

Revisiting proxy re-encryption: forward secrecy, improved security, and applications

D Derler, S Krenn, T Lorünser, S Ramacher… - … workshop on public key …, 2018 - Springer
We revisit the notion of proxy re-encryption (PRE PRE), an enhanced public-key encryption
primitive envisioned by Blaze et al.(E urocrypt'98) and formalized by Ateniese et …

Fine-grained proxy re-encryption: Definitions and constructions from LWE

Y Zhou, S Liu, S Han, H Zhang - … Conference on the Theory and Application …, 2023 - Springer
Proxy re-encryption (PRE) allows a proxy with a re-encryption key to translate a ciphertext
intended for Alice (delegator) to another ciphertext intended for Bob (delegatee) without …

Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices

N Chandran, M Chase, FH Liu, R Nishimaki… - … Workshop on Public …, 2014 - Springer
In this work we define multiple relaxations to the definition of correctness in secure
obfuscation. While still remaining meaningful, these relaxations provide ways to obfuscate …

Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model

P Dutta, W Susilo, DH Duong, PS Roy - Theoretical Computer Science, 2021 - Elsevier
The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and
Strauss in 1998. PRE offers delegation of decryption rights, ie, it securely enables the re …