scispace - formally typeset
Search or ask a question
Topic

Proxy re-encryption

About: Proxy re-encryption is a research topic. Over the lifetime, 708 publications have been published within this topic receiving 33624 citations.


Papers
More filters
Book ChapterDOI
17 Jul 2020
TL;DR: In this paper, the authors proposed a blockchain-based scheme for electronic medical record data sharing that enables third-party data users to share patient data without violating patient privacy, which enhances the security of the data.
Abstract: The data stored into the blockchain is immutable, which enhances the security of the data. In this work, we propose a blockchain-based scheme for electronic medical record data sharing that enables third-party data users to share patient’s data without violating patient privacy. First, we propose a system model of the scheme. The scheme is constructed using a private blockchain and a consortium blockchain. The private blockchain stores the patient’s diagnostic record (DR). The consortium blockchain stores secure indexes composed of keywords of DRs. Diagnostic records and keywords take the form of encrypted ciphertext information. Second, we use public encryption with keyword search (PEKS) technology to achieve a secure search of keywords on the consortium blockchain. In the decryption phase, we use proxy re-encryption (PRE) technology to enable third-party data users to securely access patient data. Finally, we evaluate the performance of the scheme through numerical simulation experiments.

1 citations

Patent
05 Dec 2019
TL;DR: In this paper, a distributed proxy re-encryption key ledger is managed by multiple nodes in a distributed peer-to-peer network, where a network device may receive shared data defining access to a proxy Re-Encryption key.
Abstract: A device, system, and method for decentralized management of a distributed proxy re-encryption key ledger by multiple devices in a distributed peer-to-peer network. A network device may receive shared data defining access to a proxy re-encryption key. The network device may locally generate a hash code based on the shared data. The network device may receive a plurality of hash codes generated based on versions of the shared data at a respective plurality of the other devices in the network. If the locally generated hash code matches the received plurality of hash codes, the network device may validate that the shared data is the same across the network devices and may add the received proxy re-encryption key access data and locally generated hash code to a local copy of the distributed proxy re-encryption key ledger.

1 citations

Journal Article
TL;DR: The comparison results and practical application show that the proposed protocol does not need to re-encrypt content when sharing, and can effectively resist the collision attacks, which is efficient and secure.
Abstract: In order to protect the copyright of digital content,an authorization protocol of multimedia digital rights management based on proxy re-encryption is proposed. The proposed protocol allows content providers to encrypt multimedia content on their clients,and allows the users to share the encrypted multimedia content and apply license from license server. After obtaining the license,the users can apply the content encryption key from key proxy server. The key proxy server re-encrypts the content encryption key and sends the encrypted content encryption key to the users,while license server cannot get the content encryption key. Based on the proposed protocol,a content sharing platform for digital TV programs in cloud computing is developed. The comparison results and practical application show that the proposed protocol does not need to re-encrypt content when sharing,and can effectively resist the collision attacks, which is efficient and secure.

1 citations

Journal ArticleDOI
TL;DR: It is clarified that the received message is well-formed is the premise to decryption in all encryption schemes, and the underlying mechanism to keep the communicated message well- formed in encryption schemes is another topic.
Abstract: Unlike some earlier proxy re-encryption schemes, the LV08 scheme specifies a validity-checking process to guarantee that the received ciphertext is well-formed. In this paper, we clarify that the received message is well-formed is the premise to decryption in all encryption schemes. The underlying mechanism to keep the communicated message well-formed in encryption schemes is another topic. We will simplify the LV08 scheme and show its security level is the same as that of the AFGH05 scheme.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Authentication
74.7K papers, 867.1K citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Server
79.5K papers, 1.4M citations
79% related
Routing protocol
46.5K papers, 901.8K citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202336
202275
202147
202059
201959
201869