scispace - formally typeset
Search or ask a question
Topic

Proxy re-encryption

About: Proxy re-encryption is a research topic. Over the lifetime, 708 publications have been published within this topic receiving 33624 citations.


Papers
More filters
Journal ArticleDOI
01 Feb 2021
TL;DR: A blockchain-based searchable proxy re-encryption scheme for EHR security storage and sharing that can resist identity disguise and replay attacks, and has stronger security and higher efficiency.
Abstract: The sharing of electronic health records (EHR) has shown significant advantages in the accurate diagnosis of patients and the development of medical institutions. However, due to the privacy and sensitivity of medical data, it is easy to cause security issues such as difficulty in data sharing among different medical institutions and easy leakage of data privacy. Because the blockchain has the characteristics of non-tampering, anonymity, and decentralization. We propose a blockchain-based searchable proxy re-encryption scheme for EHR security storage and sharing. First, we use blockchain and cloud server to store encrypted EHR together to prevent EHR from being tampered with and leaked. Secondly, we use a certificateless encryption and proxy re-encryption based on identity and type scheme as a data sharing protocol. Meanwhile, searchable encryption technology is used to generate a keyword index. Moreover, the proxy node is selected by the delegated proof-of-stake (DPOS) consensus algorithm, which ensures the privacy, immutability and security. It realizes the safe access of third-party data users to medical health data. Finally, security analysis and evaluation show that our scheme can resist identity disguise and replay attacks. In addition, it has stronger security and higher efficiency.

1 citations

01 Jan 2014
TL;DR: An algorithm is proposed and implemented based ElGamalpublic key cryptographic method, this approach allows different re-encryptions for different users through proxy re- Encryption, which is highly suitable for PHRS for different health centers.
Abstract: The advent of semi-conductors emerged day to day and lead us to the current trend of Cloud computing, which brings the information required to our life at our finger tips. The technology of today is getting expanded every day, especially in the management of EHR's. In order to provide high security for health care data we need a strong security mechanism for EHR, Proxy re-encryption schemes are cryptographic method which makes third party (proxy) to transform cipher text in one encrypted form to another, so that it is decrypted by receiving party's private key without revealing the original text to proxy. These schemes have many applications such as mail forwarding, access control in networked file storage and securing personal health records storage system (PHRS). PHRS is the storage of health information. The data in the system is not from one health center instead it is combined from various health centers. This collected storage data can be further usedby different health and research centers. Patient can share their personal health care information anytime and anywhere whenever required. According to person's confidentiality right on their own health related information needs to be maintained in a highly secured way by the system. In this paper an algorithm is proposed and implemented based ElGamalpublic key cryptographic method, this approach allows different re-encryptions for different users through proxy re-encryption.This is highly suitable for PHRS for different health centers.

1 citations

Book ChapterDOI
TL;DR: This paper proposes a method to forward each group key to a group member in a decentralized way using proxy re-encryption, best suited for large-scale dynamic IoT networks without a central network controller.
Abstract: It appears that interest in the Internet of things (IoT) has recently reached its peak, with a great deal of focus from both the private and public sectors. IoT, a technology that enables the exchange of data through linkage among all objects surrounding the user, can create new services. Data communication among objects is not limited to personal information, but can also deliver different data types, such as sensing information collected from the surrounding environment. When such data is collected and used maliciously by an attacker, it is more vulnerable to threats than in conventional network environments. Security of all data transmitted in the IoT environment is therefore essential for preventing attacks. In IoT network composed of many sensors, group communication is required. However, it is difficult to apply the conventional cipher algorithm to IoT devices. In this paper, we propose a method to forward each group key to a group member in a decentralized way using proxy re-encryption. The proposed scheme is best suited for large-scale dynamic IoT networks without a central network controller.

1 citations

Posted Content
01 Jan 2015
TL;DR: Yang et al. as mentioned in this paper constructed the first unidirectional, single-hop CCA-secure certicateless proxy reencryption scheme without pairing by extending the PKI based construction of Chow et al proposed in 2010.
Abstract: Proxy Re-Encryption was introduced by Blaze, Bleumer and Strauss to eciently solve the problem of delegation of decryption rights In proxy re-encryption, a semi-honest proxy transforms a ciphertext intended for Alice to a ciphertext of the same message for Bob without learning anything about the underlying message From its introduction, several proxy re-encryption schemes in the Public Key Infrastructure (PKI) and Identity (ID) based setting have been proposed In practice, systems in the public key infrastructure suer from the certicate management problem and those in identity based setting suer from the key escrow problem Certicateless Proxy Re-encryption schemes enjoy the advantages provided by ID-based constructions without suering from the key escrow problem In this work, we construct the rst unidirectional, single-hop CCA-secure certicateless proxy reencryption scheme without pairing by extending the PKI based construction of Chow et al proposed in 2010 We prove its security in the random oracle model under the Computational Die-Hellman (CDH) assumption Prior to this work, the only secure certicateless proxy re-encryption scheme is due to Guo et al proposed in 2013 using bilinear pairing They proved their construction is RCCA-secure under q-weak Decisional Bilinear Die-Hellman assumption The construction proposed in this work is more ecient than that system and its security relies on more standard assumptions We also show that the recently proposed construction of Yang et al is insecure with respect to the security model considered in this work

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Authentication
74.7K papers, 867.1K citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Server
79.5K papers, 1.4M citations
79% related
Routing protocol
46.5K papers, 901.8K citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202336
202275
202147
202059
201959
201869