Journal ArticleDOI
Hierarchical conditional proxy re-encryption
Reads0
Chats0
TLDR
A new primitive called hierarchical conditional proxy re-encryption (HC-PRE) is introduced that enhances the concept of C-PRE by allowing more general re- Encryption key delegation patterns.About:
This article is published in Computer Standards & Interfaces.The article was published on 2012-06-01. It has received 21 citations till now. The article focuses on the topics: Proxy re-encryption & Proxy (statistics).read more
Citations
More filters
Journal ArticleDOI
Identity-based data storage in cloud computing
Jinguang Han,Willy Susilo,Yi Mu +2 more
TL;DR: This paper proposes an identity-based data storage scheme where both queries from the intra-domain and inter-domain are considered and collusion attacks can be resisted and the access permission can be determined by the owner independently.
Posted Content
ZeroDB white paper
M. Egorov,MacLane Scott Wilkison +1 more
TL;DR: ZeroDB is an end-to-end encrypted database that enables clients to operate on (search, sort, query, and share) encrypted data without exposing encryption keys or cleartext data to the database server.
Journal ArticleDOI
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services
TL;DR: A new scheme for cloud storage services that integrates keyword search with conditional proxy re-encryption and provides proven data owner authentication, re-delegation, and chosen-ciphertext security is proposed.
Journal ArticleDOI
A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment
TL;DR: A new CPRE scheme, namely the CPRE for mobile cloud, which utilizes the back‐end cloud to the extreme extent so that the overhead of terminals is drastically reduced and the proposed scheme allows users to verify the correctness of outsourced computation under refereed delegation of computation model.
Journal ArticleDOI
On the application of generic CCA-secure transformations to proxy re-encryption
TL;DR: This paper proposes an extension of the Fujisaki-Okamoto transformation for PRE, which achieves a weak form of CCA security in the random oracle model, and describes the sufficient conditions for applying it.
References
More filters
Book ChapterDOI
Public Key Encryption with Keyword Search
TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Journal ArticleDOI
Improved proxy re-encryption schemes with applications to secure distributed storage
TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Book ChapterDOI
Divertible protocols and atomic proxy cryptography
TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.
Posted Content
Hierarchical Identity Based Encryption with Constant Size Ciphertext.
TL;DR: In this paper, a Hierarchical Identity Based Encryption (HIBE) scheme is presented, where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, regardless of the hierarchy depth.
Book ChapterDOI
Hierarchical identity based encryption with constant size ciphertext
TL;DR: In this article, a Hierarchical Identity Based Encryption (HIBE) scheme is presented, where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, regardless of the hierarchy depth.