Proxy re-encryption: Analysis of constructions and its application to secure access delegation

D Nuñez, I Agudo, J Lopez - Journal of Network and Computer Applications, 2017 - Elsevier
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …

Attribute based data sharing with attribute revocation

S Yu, C Wang, K Ren, W Lou - Proceedings of the 5th ACM symposium …, 2010 - dl.acm.org
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic
primitive for fine-grained access control of shared data. In CP-ABE, each user is associated …

CCA-secure proxy re-encryption without pairings

J Shao, Z Cao - International Workshop on Public Key Cryptography, 2009 - Springer
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under
Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot …

Efficient unidirectional proxy re-encryption

SSM Chow, J Weng, Y Yang, RH Deng - … , South Africa, May 3-6, 2010 …, 2010 - Springer
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally
intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re …

Flexible end-to-end content security in CCN

CA Wood, E Uzun - 2014 IEEE 11th Consumer …, 2014 - ieeexplore.ieee.org
Content-centric networking (CCN) project, a flavor of information-centric networking (ICN),
decouples data from its source by shifting the emphasis from hosts and interfaces to …

Conditional proxy re-encryption secure against chosen-ciphertext attack

J Weng, RH Deng, X Ding, CK Chu, J Lai - Proceedings of the 4th …, 2009 - dl.acm.org
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a
ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has …

Conditional identity-based broadcast proxy re-encryption and its application to cloud email

P Xu, T Jiao, Q Wu, W Wang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Recently, a number of extended Proxy Re-Encryptions (PRE), eg Conditional (CPRE),
identity-based PRE (IPRE) and broadcast PRE (BPRE), have been proposed for flexible …

Ordered-element naming for name-based packet forwarding

I Solis - US Patent 9,978,025, 2018 - Google Patents
A name-based content-forwarding system generates an ordered-element name for a content
item, and can process an interest to identify and perform an action that satisfies the interest …

Controlling the spread of interests and content in a content centric network

VL Jacobson, DK Smetters - US Patent 9,456,054, 2016 - Google Patents
2014/O146819 A1 5, 2014 Bae Secure Proxy Re-Encryption without Pairings. CANS. Spring
Lec 2014/O149733 A1 5, 2014 Kim ture Notes in Computer Science vol. 5339 (2008) …

Cloud based data sharing with fine-grained proxy re-encryption

Y Yang, H Zhu, H Lu, J Weng, Y Zhang… - Pervasive and Mobile …, 2016 - Elsevier
Conditional proxy re-encryption (CPRE) enables fine-grained delegation of decryption
rights, and has many real-world applications. In this paper, we present a ciphertext-policy …