scispace - formally typeset
Search or ask a question
Topic

Proxy re-encryption

About: Proxy re-encryption is a research topic. Over the lifetime, 708 publications have been published within this topic receiving 33624 citations.


Papers
More filters
Patent
24 Sep 2014
TL;DR: In this article, a data transfer method and system using a conditional proxy re-encryption method can minimize the generation of the reencryption key of a transfer object by limiting a part for using a condition value with encoding and decoding processes.
Abstract: Provided are a data transfer method and system using a conditional proxy re-encryption method The data transfer method and system using a conditional proxy re-encryption method can minimize the generation of the re-encryption key of a transfer object by limiting a part for using a condition value with encoding and decoding processes Also, the data transfer method and system using a conditional proxy re-encryption method can manage an accurate decoding authority control on the transfer object by using the condition value

1 citations

17 Nov 2016
TL;DR: This paper implies that the brand new primitive is safe against selected-cipher text attacks within the standard model and provides practical and fine-grained encrypted data discussing so that an information owner is permitted to talk about a cipher text of information amongst others under some specified conditions.
Abstract: The fundamental dependence on the services is to be sure the confidentiality from the data. This paper, the very first time, proposes a privacy-preserving cipher text multi-discussing mechanism to offer the above qualities. By utilizing some traditional PKE, Identity-Based File encryption (IBE), or Attribute-Based File encryption (ABE), the confidentiality from the record could be protected effectively. It combines the merits of proxy re-file encryption with anonymous technique where a cipher text could be safely and conditionally shared multiple occasions without dripping both understanding of underlying message and also the identity information of cipher text senders/recipients. The necessity of secure big data storage services are more inviting than ever before up to now. The safety type of MH-IBCPRE may be the fundamental one, where a challenger plays the sport using the foe to produce Selected-Cipher text Attacks (CCA) towards the original cipher text and re-encrypted cipher text to be able to solve a tough problem. However, the anonymity from the service clients, probably the most essential facets of privacy, should be thought about concurrently. In addition, this paper implies that the brand new primitive is safe against selected-cipher text attacks within the standard model. Furthermore, the service should also provide practical and fine-grained encrypted data discussing so that an information owner is permitted to talk about a cipher text of information amongst others under some specified conditions.

1 citations

Journal ArticleDOI
TL;DR: An application, attribute-based proxy reencryption on ZigBee networks, which can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes to resolve overhead and routing security problems.
Abstract: ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy reencryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Authentication
74.7K papers, 867.1K citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Server
79.5K papers, 1.4M citations
79% related
Routing protocol
46.5K papers, 901.8K citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202336
202275
202147
202059
201959
201869