搜索结果: 1-15 共查到“re-encryption”相关记录53条 . 查询时间(0.14 秒)
Strong Post-Compromise Secure Proxy Re-Encryption
Proxy re-encryption key rotation post-compromise security
font style='font-size:12px;'>
2019/4/11
Proxy Re-Encryption (PRE), introduced by Bellare et. al, allows a ciphertext encrypted using a key pki to be re-encrypted by a third party so that it is an encryption of the same message under a new k...
A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
Identity-Based Proxy Re-Encryption Collusion-resistance Random Oracle
font style='font-size:12px;'>
2018/11/29
Cloud storage enables its users to store confidential information as encrypted files in the cloud. A cloud user (say Alice) can share her encrypted files with another user (say Bob) by availing proxy ...
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
Proxy Re-Encryption Random Oracle Model Chosen Ciphertext Security
font style='font-size:12px;'>
2018/11/29
Proxy re-encryption (PRE) enables delegation of decryption rights by entrusting a proxy server with special information, that allows it to transform a ciphertext under one public key into a ciphertext...
Universal Proxy Re-Encryption
universal proxy re-encryption proxy re-encryption public-key encryption
font style='font-size:12px;'>
2018/11/16
We put forward the notion of universal proxy re-encryption (UPRE). A UPRE scheme enables us to convert a ciphertext under a (delegator) public key of any existing public-key encryption (PKE) scheme in...
Adaptively Secure Proxy Re-encryption
public-key cryptography PRE
font style='font-size:12px;'>
2018/5/11
All existing security proofs for PRE only show selective security, where the adversary must first declare the users it wants to corrupt. This can be lifted to more meaningful adaptive security by gues...
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications
forward secrecy proxy re-encryption improved security model
font style='font-size:12px;'>
2018/4/10
We revisit the notion of proxy re-encryption (PRE), an enhanced public-key encryption primitive envisioned by Blaze et al. (Eurocrypt'98) and formalized by Ateniese et al. (NDSS'05) for delegating dec...
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing
Proxy Re-Encryption Pairing-free Public Key
font style='font-size:12px;'>
2017/9/14
Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss to provide delegation of decryption rights. A semi-trusted proxy agent re-encrypts ciphertexts under the...
Improved Security Notions for Proxy Re-Encryption to Enforce Access Control
Proxy re-encryption applied cryptography unidirectional
font style='font-size:12px;'>
2017/9/1
Proxy Re-Encryption (PRE) allows a ciphertext encrypted under Alice's public key to be transformed to an encryption under Bob's public key without revealing either the plaintext or the decryption keys...
Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation
Proxy Re-encryption Ciphertext Delegation Hybrid Encryption
font style='font-size:12px;'>
2017/9/1
We consider the problems of i) using public-key encryption to enforce dynamic access control on clouds; and ii) key rotation of data stored on clouds. Historically, proxy re-encryption, ciphertext del...
An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing
Proxy Re-Encryption Pairing-less Public Key
font style='font-size:12px;'>
2017/8/16
Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss to provide delegation of decryption rights. PRE allows re-encryption of a ciphertext intended for Alice ...
Proxy Re-Encryption and Re-Signatures from Lattices
PRE PRS
font style='font-size:12px;'>
2017/5/26
Proxy re-encryption (PRE) and Proxy re-signature (PRS) were introduced by Blaze, Bleumer and Strauss [Eurocrypt '98]. Basically, PRE allows a semi-trusted proxy to transform a ciphertext encrypted und...
Fast Proxy Re-Encryption for Publish/Subscribe Systems
lattice crypto public-key cryptography proxy re-encryption
font style='font-size:12px;'>
2017/5/15
We develop two IND-CPA-secure multi-hop unidirectional Proxy Re-Encryption (PRE) schemes by applying the Ring-LWE (RLWE) relinearization approach from the homomorphic encryption literature. Unidirecti...
Semantically Secure Anonymity: Foundations of Re-encryption
probabilistic re-encryption key anonymity anonymous communication
font style='font-size:12px;'>
2016/4/6
The notion of universal re-encryption is an established primitive used in the design of many anonymity protocols. It allows anyone to randomize a ciphertext without changing its size, without decrypti...
Proxy Re-Encryption Schemes with Key Privacy from LWE
PRE LWE
font style='font-size:12px;'>
2016/3/28
Proxy re-encryption (PRE) is a cryptographic primitive in which a proxy can transform Alice’s ciphertexts
into ones decryptable by Bob. Key-private PRE specifies an additional level of security, requ...
A Parametric Family of Attack Models for Proxy Re-Encryption
proxy re-encryption security notions attack models
font style='font-size:12px;'>
2016/3/18
Proxy Re-Encryption (PRE) is a type of Public-Key Encryption (PKE) that provides an additional re-encryption functionality. Although PRE is inherently more complex than PKE, attack models for PRE have...