System and method for secure three-party communications

DP Felsher, RH Nagel, SM Hoffberg - US Patent 8,316,237, 2012 - Google Patents
(57) ABSTRACT A system and method for communicating information between a first party
and a second party, comprising the steps of receiving, by an intermediary, an identifier of …

KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage

J Li, X Lin, Y Zhang, J Han - IEEE Transactions on Services …, 2016 - ieeexplore.ieee.org
Cloud computing becomes increasingly popular for data owners to outsource their data to
public cloud servers while allowing intended data users to retrieve these data stored in …

Revocable identity-based broadcast proxy re-encryption for data sharing in clouds

C Ge, Z Liu, J Xia, L Fang - IEEE transactions on dependable …, 2019 - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …

Searchable attribute-based mechanism with efficient data sharing for secure cloud storage

K Liang, W Susilo - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
To date, the growth of electronic personal data leads to a trend that data owners prefer to
remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …

A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security

K Liang, L Fang, W Susilo… - 2013 5th international …, 2013 - ieeexplore.ieee.org
Cipher text-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) extends the traditional
Proxy Re-Encryption (PRE) by allowing a semi-trusted proxy to transform a cipher text under …

SCRAPE: Scalable randomness attested by public entities

I Cascudo, B David - … Conference on Applied Cryptography and Network …, 2017 - Springer
Uniform randomness beacons whose output can be publicly attested to be unbiased are
required in several cryptographic protocols. A common approach to building such beacons …

Efficient unidirectional proxy re-encryption

SSM Chow, J Weng, Y Yang, RH Deng - … , South Africa, May 3-6, 2010 …, 2010 - Springer
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally
intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re …

CCA-secure proxy re-encryption without pairings

J Shao, Z Cao - International Workshop on Public Key Cryptography, 2009 - Springer
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under
Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot …

Identity-based encryption transformation for flexible sharing of encrypted data in public cloud

H Deng, Z Qin, Q Wu, Z Guan, RH Deng… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the rapid development of cloud computing, an increasing number of individuals and
organizations are sharing data in the public cloud. To protect the privacy of data stored in the …

Chosen-ciphertext secure proxy re-encryption without pairings

RH Deng, J Weng, S Liu, K Chen - … 2008, Hong-Kong, China, December 2 …, 2008 - Springer
In a proxy re-encryption system, a semi-trusted proxy can convert a ciphertext originally
intended for Alice into a ciphertext intended for Bob, without learning the underlying …