KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage

G Pareek, BR Purushothama - Journal of information security and …, 2021 - Elsevier
Key-aggregate cryptosystems (KAC) have attracted significant attention from the research
community because of their elegance and efficiency in enforcing predefined access control …

Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance

G Pareek, BR Purushothama - Journal of Information Security and …, 2020 - Elsevier
Proxy Re-encryption (PRE) offers an efficient solution for enforcing access control on
outsourced data through delegation of decryption rights of a delegator to a delegatee …

Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks

SM Patil, BR Purushothama - Journal of Information Security and …, 2020 - Elsevier
We focus on proposing a threshold proxy re-encryption scheme for networks with resource
constrained devices. We show that the existing quorum controlled proxy re-encryption …

Rsa-based collusion resistant quorum controlled proxy re-encryption scheme for distributed secure communication

SM Patil, BR Purushothama - International Conference on Distributed …, 2018 - Springer
In this paper, we analyze the quorum controlled proxy re-encryption scheme proposed by
Jakobsson for the security. We show that the scheme is susceptible to collusion and cannot …

Blockchain-based decentralised access control scheme for dynamic hierarchies

G Pareek, BR Purushothama - International Journal of …, 2021 - inderscienceonline.com
Cryptographic hierarchical access control is widely employed in systems that manage data
or resources. To meet scalability and high availability requirements, it is desirable that an …

Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies

G Pareek, BR Purushothama - Sādhanā, 2019 - Springer
In this paper, we focus on practically motivated flexibility requirements for the hierarchical
access control model, namely transitive exception and anti-symmetric exception …

Efficient strong key indistinguishable access control in dynamic hierarchies with constant decryption cost

G Pareek, BR Purushothama - … of the 11th International Conference on …, 2018 - dl.acm.org
Hierarchical access control is for scenarios where some users have access to more
organization data than others. In this paper, we propose an efficient key assignment scheme …

Cloud-based data-sharing scheme using verifiable and cca-secure re-encryption from indistinguishability obfuscation

M Zhang, Y Jiang, H Shen, B Li, W Susilo - International Conference on …, 2018 - Springer
A cloud-based re-encryption scheme allows a semi-trusted cloud proxy to convert a
ciphertext under delegator's public-key into a ciphertext of delegatee's. However, for an …

Flexible cryptographic access control through proxy re-encryption between groups

G Pareek - Proceedings of the 20th International Conference on …, 2019 - dl.acm.org
A cryptographic access control scheme enforces access control policy of the data owner on
his encrypted data. Most widely used cryptographic access control mechanism is …