Journal ArticleDOI
Analysis of One Proxy Re-Encryption Scheme
Li Hua Liu,Zheng Jun Cao +1 more
TLDR
It is clarified that the received message is well-formed is the premise to decryption in all encryption schemes, and the underlying mechanism to keep the communicated message well- formed in encryption schemes is another topic.Abstract:
Unlike some earlier proxy re-encryption schemes, the LV08 scheme specifies a validity-checking process to guarantee that the received ciphertext is well-formed. In this paper, we clarify that the received message is well-formed is the premise to decryption in all encryption schemes. The underlying mechanism to keep the communicated message well-formed in encryption schemes is another topic. We will simplify the LV08 scheme and show its security level is the same as that of the AFGH05 scheme.read more
Citations
More filters
Journal ArticleDOI
The Design of 3D-Printed Lattice-Reinforced Thickness-Varying Shell Molds for Castings.
TL;DR: This lattice-reinforced thickness-varying shell mold generation method is of great significance for mold design for castings to achieve cooling control.
References
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Book ChapterDOI
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
TL;DR: In this article, a new signature scheme is proposed together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem and the security of both systems relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI
Improved proxy re-encryption schemes with applications to secure distributed storage
TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Book ChapterDOI
Divertible protocols and atomic proxy cryptography
TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.
Related Papers (5)
P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption
Sumana Maiti,Sudip Misra +1 more
A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage
Peng Zeng,Kim-Kwang Raymond Choo +1 more