KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage

G Pareek, BR Purushothama - Journal of information security and …, 2021 - Elsevier
Key-aggregate cryptosystems (KAC) have attracted significant attention from the research
community because of their elegance and efficiency in enforcing predefined access control …

Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance

G Pareek, BR Purushothama - Journal of Information Security and …, 2020 - Elsevier
Proxy Re-encryption (PRE) offers an efficient solution for enforcing access control on
outsourced data through delegation of decryption rights of a delegator to a delegatee …

Generalization of multicast encryption for Internet of Things deployment

P Sharma, BR Purushothama - Journal of Information Security and …, 2023 - Elsevier
The problem of multicast encryption has been a focus of attention in the Internet of Things
environment for the last decade, in which one central server generates and securely …

A lightweight group key management scheme with constant rekeying cost and public bulletin size

P Sharma, P BR - Information Security Journal: A Global …, 2024 - Taylor & Francis
Several group key management schemes have focused either on meeting security goals or
efficiency. However, only a few works exist that address the issue of handling offline users …

EPREKM: ElGamal proxy re‐encryption‐based key management scheme with constant rekeying cost and linear public bulletin size

P Sharma, P BR - Concurrency and Computation: Practice and …, 2024 - Wiley Online Library
A vast body of literature is filled with many key management schemes constructed using
different cryptographic primitives. They aim toward either security goals or improvement in …

CCA secure and efficient proxy re-encryption scheme without bilinear pairing

S Prasad, BR Purushothama - Journal of Information Security and …, 2021 - Elsevier
Proxy re-encryption enables the conversion of ciphertext of a message encrypted with one
users public key into a ciphertext that could be decrypted by another users private key. Proxy …

Blockchain-based decentralised access control scheme for dynamic hierarchies

G Pareek, BR Purushothama - International Journal of …, 2021 - inderscienceonline.com
Cryptographic hierarchical access control is widely employed in systems that manage data
or resources. To meet scalability and high availability requirements, it is desirable that an …

User driven general framework to cap the joins in secure group communication

P Sharma, BR Purushothama - International Journal of …, 2024 - inderscienceonline.com
In the literature, secure group key management schemes have focused on either rekeying
cost or security requirements, ie, forward and backward secrecy. There is little or no work …

[PDF][PDF] Security Analysis of Proxy Cryptography Based Group Key Management Schemes for Dynamic and Wireless Networks Under Active Outsider Attack Model.

SM Patil, P BR - Journal of Information Assurance & Security, 2019 - mirlabs.org
The existing group key management schemes have considered passive adversary model to
show that schemes satisfy forward and backward secrecy requirements. A more pragmatic …

Why Traditional Group Key Management Schemes Don't Scale in Multi-group Settings?

P Sharma, BR Purushothama - … Conference on Frontiers in Computing and …, 2022 - Springer
The traditional key management schemes focus on single-group settings. The design
principles focus on reducing the rekeying, storage, and computation costs and satisfying …