scispace - formally typeset
Search or ask a question
Topic

Proxy re-encryption

About: Proxy re-encryption is a research topic. Over the lifetime, 708 publications have been published within this topic receiving 33624 citations.


Papers
More filters
Proceedings ArticleDOI
23 Apr 2010
TL;DR: An identity based proxy re-encryption (IBPRE) scheme is constructed which can achieve master secret secure, while almost all of the previous efficient IBPRE schemes can not.
Abstract: The concept of proxy re-cryptography comes from the work of Blaze, Bleumer, and Strauss in 1998. The goal of proxy re-encryption is to securely enable the re-encryption of ciphertexts from one key to another, without relying on trusted parties. Identity based proxy re-encryption extends proxy re-encryption to the identity based setting. In this paper, we construct an identity based proxy re-encryption (IBPRE) scheme which can achieve master secret secure, while almost all of the previous efficient IBPRE schemes can not.

11 citations

Proceedings ArticleDOI
01 Dec 2012
TL;DR: An improvement is performed in Libert and Vergnaud scheme by improving the security levels of encryption using ASCII values by justifying the strength of this Non-Transitive Unidirectional Proxy Re-Encryption (PRE) schemes with experimental results.
Abstract: To improve the network security by a cryptographic primitive called proxy re-encryption in which a proxy can transform a ciphertext encrypted under one key without seeing the actual plaintext into an encryption of the same plaintext under another key This cryptographic concept has recently drawn renewed interest Some researchers also showed how to properly define chosen-ciphertext security for the primitive This system supports bidirectional as the translation key allows converting ciphertexts in both directions The proposed concept presents the unidirectional proxy re-encryption schemes with chosen-ciphertext security without using the random oracle idealization In 2008, Libert and Vergnaud presented the first construction of unidirectional proxy re-encryption scheme with chosen-ciphertext security in the standard model The limitation of their scheme is the longer length of original ciphertext and re-encrypted ciphertext In this paper, an improvement is performed in Libert and Vergnaud scheme by improving the security levels of encryption using ASCII values The proposed work additionally outlines Non-Transitive Unidirectional Proxy Re-Encryption (PRE) schemes This paper justifies the strength of this PRE with experimental results

11 citations

Proceedings ArticleDOI
19 Sep 2012
TL;DR: Identity based proxy re-encryption (IBPRE) is a primitive combing the feature of IBE and PRE, which is not CCA-secure in the corresponding security models by giving concrete attacks.
Abstract: In proxy re-encryption (PRE), a semi-trusted proxy can convert a cipher text originally intended for Alice into one which can be decrypted by Bob, while the proxy can not know the underlying plaintext. In multi-use PRE schemes, the cipher text can be transformed from Alice to Bob and to Charlie and so on. Due to its cipher text transformation property, it is difficult to achieve chosen cipher text security for PRE, especially for multi-use PRE. IBE is a new kind of public-key encryption where the recipient's public key is an arbitrary string that represents the recipient's identity. Identity based proxy re-encryption (IBPRE) is a primitive combing the feature of IBE and PRE. Recently Wang et al. proposed a multi-use unidirectional CCA-secure identity based proxy re-encryption (IBPRE) scheme. Unfortunately, we show their proposal is not CCA-secure in the corresponding security models by giving concrete attacks.

11 citations

Journal ArticleDOI
TL;DR: The chosen key (CK) model which allows the adversary to adaptively choose public keys for malicious users, is strictly stronger than the knowledge of secret key models (KOSK) that most of previous PREs rely on.

11 citations

Posted Content
TL;DR: Two new proxy re-encryption systems are proposed; one for the transformation from ciphertexts encrypted under a traditional PKI-based public key into the cipher texts that can be decrypted by an secret key for Identity-Based Encryption, and the other for the Transformation from cipher Texts encrypted in IBE manner into the different cipherTexts that could be dec encrypted by the other secret key by the IBE.
Abstract: A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the dierent cipher- texts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from cipher- texts encrypted under a traditional certificate-based public key into the ciphertexts that can be decrypted by an secret key for Identity-Based Encryption, and the other one for the transformation from ciphertexts encrypted in IBE manner into the dierent ciphertexts that can be de-

11 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Authentication
74.7K papers, 867.1K citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Server
79.5K papers, 1.4M citations
79% related
Routing protocol
46.5K papers, 901.8K citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202336
202275
202147
202059
201959
201869