Proxy re-encryption: Analysis of constructions and its application to secure access delegation

D Nuñez, I Agudo, J Lopez - Journal of Network and Computer Applications, 2017 - Elsevier
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …

Fast proxy re-encryption for publish/subscribe systems

Y Polyakov, K Rohloff, G Sahu… - ACM Transactions on …, 2017 - dl.acm.org
We develop two IND-CPA-secure multihop unidirectional Proxy Re-Encryption (PRE)
schemes by applying the Ring-LWE (RLWE) key switching approach from the homomorphic …

Public trace-and-revoke proxy re-encryption for secure data sharing in clouds

F Luo, H Wang, W Susilo, X Yan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Proxy re-encryption (PRE), as a promising cryptographic primitive for secure data sharing in
clouds, has been widely studied for decades. PRE allows the proxies to use the re …

Accountable proxy re-encryption for secure data sharing

H Guo, Z Zhang, J Xu, N An… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Proxy re-encryption (PRE) provides a promising solution for encrypted data sharing in public
cloud. When data owner Alice is going to share her encrypted data with data consumer Bob …

Revisiting proxy re-encryption: forward secrecy, improved security, and applications

D Derler, S Krenn, T Lorünser, S Ramacher… - … workshop on public key …, 2018 - Springer
We revisit the notion of proxy re-encryption (PRE PRE), an enhanced public-key encryption
primitive envisioned by Blaze et al.(E urocrypt'98) and formalized by Ateniese et …

Fine-grained proxy re-encryption: Definitions and constructions from LWE

Y Zhou, S Liu, S Han, H Zhang - … Conference on the Theory and Application …, 2023 - Springer
Proxy re-encryption (PRE) allows a proxy with a re-encryption key to translate a ciphertext
intended for Alice (delegator) to another ciphertext intended for Bob (delegatee) without …

Secured sharing of data in cloud via dual authentication, dynamic unidirectional PRE, and CPABE

N Agarwal, A Rana, JP Pandey… - International Journal of …, 2020 - igi-global.com
Cloud computing is an emergent computing paradigm; however, data security is a significant
issue in recent time while outsourcing the data to the cloud preventing users to upload their …

Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model

P Dutta, W Susilo, DH Duong, PS Roy - Theoretical Computer Science, 2021 - Elsevier
The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and
Strauss in 1998. PRE offers delegation of decryption rights, ie, it securely enables the re …

Chosen-ciphertext secure homomorphic proxy re-encryption

F Luo, S Al-Kuwari, W Susilo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Homomorphic Proxy Re-Encryption (HPRE) is an extension of Proxy Re-Encryption (PRE)
which combines the advantages of both Homomorphic Encryption (HE) and PRE. A HPRE …

Unidirectional updatable encryption and proxy re-encryption from DDH

P Miao, S Patranabis, G Watson - IACR International Conference on …, 2023 - Springer
Abstract Updatable Encryption (UE) and Proxy Re-encryption (PRE) allow re-encrypting a
ciphertext from one key to another in the symmetric-key and public-key settings, respectively …