Topic
Proxy re-encryption
About: Proxy re-encryption is a research topic. Over the lifetime, 708 publications have been published within this topic receiving 33624 citations.
Papers published on a yearly basis
Papers
More filters
••
23 May 2011TL;DR: This work proposes system model that store and divide data file into header, body and selectively delegate decryption right using Type-based Proxy re-encryption.
Abstract: To ensure data confidentiality and fine-grained access control in cloud computing environments, a recent study proposed system model using Key Policy-Attribute Based Encryption(KP-ABE) and Proxy Re-Encryption(PRE). But, existing work has effected the violation of data confidentiality through collusion attack of revoked user in system and cloud server. To resolve this problem, we propose system model that store and divide data file into header, body. In addition, our scheme selectively delegate decryption right using Type-based Proxy re-encryption.
63 citations
••
TL;DR: A conversion from non-anonymous hierarchical identity-based encryption (NaHIBE) with strongly CPA security to CCA-secure and collusion-resistant MUIBPRE, which is based on the NaHibE scheme proposed by Waters at Crypto'09, is presented.
63 citations
••
TL;DR: This method implements proxy re-encryption in order to manage data with fewer encryptions, and provides a data sharing function to supplement the insufficient capacity of lightweight device networks.
Abstract: It appears that interest in the Internet of things (IoT) has recently reached its peak, with a great deal of focus from both the private and public sectors. IoT, a technology that enables the exchange of data through linkage among all objects surrounding the user, can create new services. Data communication among objects is not limited to personal information, but can also deliver different data types, such as sensing information collected from the surrounding environment. When such data is collected and used maliciously by an attacker, it is more vulnerable to threats than in conventional network environments. Security of all data transmitted in the IoT environment is therefore essential for preventing attacks. However, it is difficult to apply the conventional cipher algorithm to lightweight devices. Therefore, we propose a method for sharing and managing data using the conventional cipher algorithm on lightweight devices in various circumstances. This method implements proxy re-encryption in order to manage data with fewer encryptions, and provides a data sharing function to supplement the insufficient capacity of lightweight device networks.
61 citations
••
10 Nov 2009TL;DR: This paper answers the question posed by Weng et al. affirmatively by presenting a new and efficient construction of anonymous conditional proxy re-encryption (C-PRE) scheme without requiring random oracle.
Abstract: A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext under a delegator's public-key and designate it to a delegatee. Weng et al. introduced the notion of conditional proxy re-encryption (or C-PRE, for short), whereby only the ciphertext satisfying one condition set by the delegator can be transformed by the proxy and then decrypted by delegatee. Nonetheless, they left an open problem on how to construct CCA-secure C-PRE schemes with anonymity. In this paper, we first formalize the notion of anonymous condition CCA-secure PRE and present a respective security model. Then, we answer the question posed by Weng et al. affirmatively by presenting a new and efficient construction of anonymous conditional proxy re-encryption (C-PRE) scheme without requiring random oracle.
56 citations
••
TL;DR: A pairing-free certificate-based proxy re-encryption scheme without bilinear pairings that is particularly suitable for the computation-limited devices and significantly reduces the computation cost.
56 citations