KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage

G Pareek, BR Purushothama - Journal of information security and …, 2021 - Elsevier
Key-aggregate cryptosystems (KAC) have attracted significant attention from the research
community because of their elegance and efficiency in enforcing predefined access control …

Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance

G Pareek, BR Purushothama - Journal of Information Security and …, 2020 - Elsevier
Proxy Re-encryption (PRE) offers an efficient solution for enforcing access control on
outsourced data through delegation of decryption rights of a delegator to a delegatee …

CCA secure and efficient proxy re-encryption scheme without bilinear pairing

S Prasad, BR Purushothama - Journal of Information Security and …, 2021 - Elsevier
Proxy re-encryption enables the conversion of ciphertext of a message encrypted with one
users public key into a ciphertext that could be decrypted by another users private key. Proxy …

TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications

G Pareek, BR Purushothama - Journal of Ambient Intelligence and …, 2021 - Springer
Proxy re-encryption (PRE) is a public-key cryptography primitive that delegates the
decryption capabilities of a user (called delegator) to another user (called delegatee) using …

Research on Role Access Control Model Based on Identity Authentication

L Chen - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Cryptography and access control are the core technologies for a secure operating system.
Cryptography can guarantee the confidentiality, integrity, availability and unforgeability of …