scispace - formally typeset
Journal ArticleDOI

Hierarchical conditional proxy re-encryption

Reads0
Chats0
TLDR
A new primitive called hierarchical conditional proxy re-encryption (HC-PRE) is introduced that enhances the concept of C-PRE by allowing more general re- Encryption key delegation patterns.
About
This article is published in Computer Standards & Interfaces.The article was published on 2012-06-01. It has received 21 citations till now. The article focuses on the topics: Proxy re-encryption & Proxy (statistics).

read more

Citations
More filters
Journal ArticleDOI

Identity-based data storage in cloud computing

TL;DR: This paper proposes an identity-based data storage scheme where both queries from the intra-domain and inter-domain are considered and collusion attacks can be resisted and the access permission can be determined by the owner independently.
Posted Content

ZeroDB white paper

TL;DR: ZeroDB is an end-to-end encrypted database that enables clients to operate on (search, sort, query, and share) encrypted data without exposing encryption keys or cleartext data to the database server.
Journal ArticleDOI

A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services

TL;DR: A new scheme for cloud storage services that integrates keyword search with conditional proxy re-encryption and provides proven data owner authentication, re-delegation, and chosen-ciphertext security is proposed.
Journal ArticleDOI

A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment

TL;DR: A new CPRE scheme, namely the CPRE for mobile cloud, which utilizes the back‐end cloud to the extreme extent so that the overhead of terminals is drastically reduced and the proposed scheme allows users to verify the correctness of outsourced computation under refereed delegation of computation model.
Journal ArticleDOI

On the application of generic CCA-secure transformations to proxy re-encryption

TL;DR: This paper proposes an extension of the Fujisaki-Okamoto transformation for PRE, which achieves a weak form of CCA security in the random oracle model, and describes the sufficient conditions for applying it.
References
More filters
Book ChapterDOI

Public Key Encryption with Keyword Search

TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Journal ArticleDOI

Improved proxy re-encryption schemes with applications to secure distributed storage

TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Book ChapterDOI

Divertible protocols and atomic proxy cryptography

TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.
Posted Content

Hierarchical Identity Based Encryption with Constant Size Ciphertext.

TL;DR: In this paper, a Hierarchical Identity Based Encryption (HIBE) scheme is presented, where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, regardless of the hierarchy depth.
Book ChapterDOI

Hierarchical identity based encryption with constant size ciphertext

TL;DR: In this article, a Hierarchical Identity Based Encryption (HIBE) scheme is presented, where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, regardless of the hierarchy depth.
Related Papers (5)