Fully secure unidirectional identity-based proxy re-encryption. Luo S,Shen QN,Chen Z. Information Security and Cryptology-ICISC 2011 . 2011S. Luo, Q. Shen, Z. Chen, Fully secure unidirectional identity-based proxy re- encryption, in: H. Kim (Ed.), ICISC 2011, in: LNCS, vol. 7259, ...
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encry...
Proxy re-encryption (PRE) enables an authorized proxy to convert a ciphertext under Alice’s public key into a ciphertext under Bob’s public key without exposing the encrypted message. In existing PRE systems, the original ciphertexts and the re-encrypted ones are both required to be in the...
In a proxy re-encryption scheme, a semi-trusted proxy is given special power that allows it to transform a ciphertext for Alice into a ciphertext for Bob without learning any information about the messages encrypted under either key. When a proxy re-encryption scheme is constructed in an ide...
In recent years, many extended identity-based broadcast proxy re-encryption (IBPRE) schemes have been put forward. These schemes are flexible enough and feasible to various application scenarios, including conditional IBPRE, revocable IBPRE,
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption (IBPRE), where a semi-trusted proxy with some information (a.k.a. re-encryption key), can transform a ciphertext under an identity to another ciphertext under another identity with the same plaintext. ...
but this method couldn't support flexible data sharing,especially for the multi-user setting.Aimed at solving this problem,this paper proposed a new identity based proxy re-encryption scheme,which didn't need the cloud to be completely trusted,but could also be used to share the data safely....
摘要: In proxy re-encryption ([equation]), a semi-trusted proxy can convert a ciphertext originally intended for Alice into one which can be decrypted by Bob, while the proxy can not know the underlying...关键词: Identity based proxy re-encryption Insecurity Security model Transitivity ...
Fortunately, our identity-based proxy re-encryption scheme is a solution to this problem. As a middleware for fulfilling our main goal, we also propose a new construction of identity-based encryption using random padding techniques. The security of our schemes is based on the standard decisional ...
About this paper Cite this paper Liang, K., Liu, J.K., Wong, D.S., Susilo, W. (2014). An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. In: Kutyłowski, M., Vaidya, J. (eds) Computer Security - ESORICS 2014. ESORICS 20...