scispace - formally typeset
Search or ask a question
Topic

Proxy re-encryption

About: Proxy re-encryption is a research topic. Over the lifetime, 708 publications have been published within this topic receiving 33624 citations.


Papers
More filters
Proceedings ArticleDOI
01 Sep 2016
TL;DR: An efficient PRE scheme based on the intractability of the (semi) groupfactorization problems is proposed in this paper and the security of the proposed scheme is analyzed according to some conceivable attacks.
Abstract: Proxy re-encryption (PRE) enables a semi-trustedproxy to transfer Alice's secrets into Bob's secrets but withoutseeing the secrets This functionality is very interesting formaking balance between the information confidentiality and themutual accessibility in various scenarios such as public cloudstorage systems During the past decades, many smart PREschemes were built based on intractability assumptions suchas integer factorization problems (IFP) and discrete logarithmproblems (DLP) However, Shor's efficient quantum algorithmsfor IFP and DLP manifests a threat towards the securitybaseline of these schemes Enlightened by Gu et al's recent workon resisting known quantum attacks, we propose an efficientPRE scheme based on the intractability of the (semi) groupfactorization problems in this paper The security of the proposedscheme is analyzed according to some conceivable attacks
Journal ArticleDOI
TL;DR: A framework for the security of the network use a ticket, an arbitrary bit sequence, to protect a key to decrypt the data and to decide whether the people have been fully allowed by home gateway or authorized people.
Abstract: This paper studies security on home network to apply access control and encryption. It is difficult to implement and run a database server for access control as individual. For both access control and encryption, home network employs a series of Attribute-Based Encryption (ABE) schemes. In a string of the encryption schemes, we apply Attribute-Based Proxy Re-Encryption (ABPRE) to the network. In our scheme, authenticated people can encrypt all the data, control access to the data and temporarily delegate their permission to another they trust implicitly. A framework we propose for the security of the network use a ticket, an arbitrary bit sequence, to protect a key to decrypt the data and to decide whether the people have been fully allowed by home gateway or authorized people. The members of the family can obtain the ticket by decrypting security message in home gateway or delegate it by re-encrypting the ticket. Periodically updated by the gateway, the ticket would be automatically expired. The representative can search and control the data by using the delegated ticket up to when the ticket is valid.
Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, the authors proposed an architecture using blockchain technology to secure data sharing in the smart healthcare system, proposed proxy re-encryption and behavioral analysis techniques make data communication and storage securely.
Abstract: With the development of the Internet of Things (IoT) and information communication technology (ICT), the traditional healthcare system changes to real-time monitoring of patients using smart devices. These smart devices are capable of collecting vital information and communicating with other devices. The smart devices are more vulnerable to the attackers because of resource constraint devices and connected through wired or wireless. The security and privacy issues like data integrity, availability, and storage, etc., are very important to make the smart healthcare system secure. In this paper, we proposed architecture using blockchain technology to secure data sharing In the smart healthcare system, proposed proxy re-encryption and behavioral analysis techniques make data communication and storage securely. The designed architecture makes vital information tamper-proof and preserves privacy for the data of the patient. Behavioral analysis is about the detailed security analysis which gives security for privacy and stops from manipulating the data.

Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Authentication
74.7K papers, 867.1K citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Server
79.5K papers, 1.4M citations
79% related
Routing protocol
46.5K papers, 901.8K citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202336
202275
202147
202059
201959
201869