scispace - formally typeset
Search or ask a question
Topic

Proxy re-encryption

About: Proxy re-encryption is a research topic. Over the lifetime, 708 publications have been published within this topic receiving 33624 citations.


Papers
More filters
Proceedings ArticleDOI
09 Aug 2012
TL;DR: The KGC broadcasts group key information to all group members as well as to the initiator, and these message can be recovered only by the authorized group members, and the confidentiality can be increased by using Proxy Re-Encryption (PRE).
Abstract: In this paper, we propose a key transfer protocol based on secret sharing scheme using initiator. Here we use a Key Generation Center (KGC) only to select session keys. The initiator is used to transport the session keys to all communicating entities secretly, in order to reduce the system overload and communication overhead cost. The initiator is given the responsibility to check the user authentication. In this paper, the KGC broadcasts group key information to all group members as well as to the initiator, and these message can be recovered only by the authorized group members. Moreover, the confidentiality can be increased by using Proxy Re-Encryption (PRE).It helps for communicating securely without any interrupt. PRE does not need to know the contents that is being encrypted and is more secure to receive the information. In addition it provides authentication, integrity and confidentiality of broadcasting message.

1 citations

Book ChapterDOI
26 Jul 2019
TL;DR: A novel lightweight proxy re-enc encryption scheme without pairing is proposed, which builds the pre-encryption algorithm based on computational Diffie–Hellman problem, and designs a certificateless protocol based on a semi-trusted Key Generation Center.
Abstract: To protect data sharing from leakage in untrusted cloud, proxy re-encryption is commonly exploited for access control. However, most proposed schemes require bilinear pair to attain secure data sharing, which gives too heavy burden on the data owner. In this paper, we propose a novel lightweight proxy re-encryption scheme without pairing. Our scheme builds the pre-encryption algorithm based on computational Diffie–Hellman problem, and designs a certificateless protocol based on a semi-trusted Key Generation Center. Theoretical analysis proves that our scheme is Chosen-Ciphertext-Attack secure. The performance is also shown to achieve less computation burden for the data owner compared with the state-of-the-art.

1 citations

Book ChapterDOI
14 Jul 2019
TL;DR: A unidirectional single-hop CP-ABPRE scheme with small size of public parameters was presented by using trapdoor sampling, and proved secure under learning with errors assumption which is widely believed secure in quantum computer attacks.
Abstract: Proxy re-encryption plays an important role in cloud sharing. Ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) scheme supports access control and can convert the ciphertext under an access policy to a ciphertext under another access policy, which is flexible and efficient for cloud sharing. The existing CP-ABPRE schemes are constructed by bilinear pairing or multi-linear maps which are fragile when the post-quantum comes. In this paper, a unidirectional single-hop CP-ABPRE scheme with small size of public parameters was presented by using trapdoor sampling, and proved secure under learning with errors assumption which is widely believed secure in quantum computer attacks.

1 citations

Proceedings ArticleDOI
14 Oct 2020
TL;DR: An extended version of the scheme is proposed which ensures data owner authentication and is analyzed and proved based on widely used BAN logic and AVISPA that fails to satisfy the requirement of authentication property.
Abstract: The internet and mobile platform together are playing a vital role in making people to keep and manage their data conveniently using cloud services. This made cloud servers to manage larger volume of data where data confidentiality has to be taken into consideration. The major issue is to overcome the tradeoff between satisfactory mobility and security and privacy in cloud environment. A long time the researches in this field focused on encryption and decryption techniques to protect data owners’ privacy and data confidentiality. These encryption and decryption techniques made another essential requirement to be focused such as searching on encrypted data. This leads to the evolution of techniques for searching on encrypted data. Further in another direction conditional proxy re-encryption scheme where cipher text satisfying certain keyword vector set determined by the owner can be re-encrypted by a proxy server started getting attention. However, the combination of both searching and hierarchical conditional proxy re-encryption has been attempted recently. In this paper the above scheme is analyzed and proved that the data owner authentication offered by the scheme is fails to satisfy the requirement of authentication property. Additionally an extended version of the scheme is proposed which ensures data owner authentication. The proposed scheme is analyzed and proved based on widely used BAN logic and AVISPA.

1 citations

Proceedings ArticleDOI
02 Nov 2020
TL;DR: To tackle privacy and trust issues between organizations, this paper presents a blockchain architecture based on the proxy re-encryption scheme that is integrated within smart contracts to provide a very efficient, fast, and secure platform.
Abstract: Blockchain is an especially promising and revolutionary technology that brings transparency in a scalable way for multiple organizations and this is thanks to its several features. There are some exciting blockchain features but among them, decentralization is undoubtedly the most interesting one. Organizations can share data within a distributed ledger. As a consequence, each one can access synchronized data stored in its local Blockchain node. This functionality improves transaction tracking and facilitates access to data within a private group of organizations. However, in some cases, even if organizations accept to share data, they require to hide some private information related to their users or their business model. To tackle privacy and trust issues between organizations, this paper presents a blockchain architecture based on the proxy re-encryption scheme. This scheme is integrated within smart contracts to provide a very efficient, fast, and secure platform. The proposed architecture is implemented in an Hyperledger Blockchain and tested in a real transport and mobility use case.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Authentication
74.7K papers, 867.1K citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Server
79.5K papers, 1.4M citations
79% related
Routing protocol
46.5K papers, 901.8K citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202336
202275
202147
202059
201959
201869