scispace - formally typeset
Search or ask a question
Topic

Proxy re-encryption

About: Proxy re-encryption is a research topic. Over the lifetime, 708 publications have been published within this topic receiving 33624 citations.


Papers
More filters
01 Jan 2013
TL;DR: This work proposes a method called as threshold proxy re-encryption scheme integrated with decentralized erasure code which formulated a secure distributed storage system which provides copy of robustness data in all storage servers and which allow more flexible.
Abstract: Collection of storage servers consist in a cloud storage system. Those servers provide number of services in internet. Storing of data in servers is very confidentiality and it consider as serious problem. Of course general methods like encryption and decryption with security key provides confidentiality but only few operations supported by those encryption and decryption methods. Then it's not much better technique used in cloud storage system. So here we propose a method called as threshold proxy re-encryption scheme. This scheme integrated with decentralized erasure code which formulated a secure distributed storage system. This system not only supports storing and retrieving in secure manner, but also supports forwarding messages from one storage server to another server without retrieving. The main technique implemented here is, encoding the encrypted messages, forwarding methods as well as decryption. Serial actions of our proposed system is encrypting, encoding, and forwarding. The proposed system provides copy of robustness data in all storage servers and which allow more flexible.

8 citations

Proceedings ArticleDOI
03 Dec 2011
TL;DR: A modified signcryption with proxy re-encryption scheme is proposed which provides public verifiable property in a way that any third party can verify the validity, and a certified e-mail protocol in id-based setting with semi-trusted third party is presented to reduce the trust extent of third party, and improve the efficiency and practice.
Abstract: Signcryption with proxy re-encryption was proposed recent by Chandrasekar. However, his scheme did not provide public verifiability, which is a desirable property in applications such as certified e-mail protocol. In this paper we firstly improve a id-based signcryption with proxy re-encryption scheme, which provides public verifiable property in a way that any third party can verify the validity, then based on this scheme we propose a modified signcryption with proxy re-encryption so that it can be used as a cryptographic primitive of certified e-mail protocol, finally we present a certified e-mail protocol in id-based setting with semi-trusted third party which reduce the trust extent of third party, and improve the efficiency and practice.

8 citations

Journal ArticleDOI
01 Jan 2018
TL;DR: An efficient inner-product proxy re-encryption scheme that provides a proxy server with a transformation key with which a delegator’s ciphertext associated with an attribute vector can be transformed to a new cipher Text associated with delegatee’S attribute vector set is proposed.
Abstract: With the ever-growing production of data coming from multiple, scattered, highly dynamical sources (like those found in IoT scenarios), many providers are motivated to upload their data to the cloud servers and share them with other persons with different purposes. However, storing data on cloud imposes serious concerns in terms of data confidentiality and access control. These concerns get more attention when data is required to be shared among multiple users with different access policies. In order to update access policy without making re-encryption, we propose an efficient inner-product proxy re-encryption scheme that provides a proxy server with a transformation key with which a delegator’s ciphertext associated with an attribute vector can be transformed to a new ciphertext associated with delegatee’s attribute vector set. Our proposed policy updating scheme enables the delegatee to decrypt the shared data with its own key without requesting a new decryption key. We experimentally analyze the efficiency of our scheme and show that our scheme is adaptive attribute-secure against chosen-plaintext under standard Decisional Linear (D-Linear) assumption.

8 citations

Book ChapterDOI
04 Jul 2016
TL;DR: This paper first formalizes the proxy re-encryption with delegatable verifiability and its corresponding security model, and proposes the first proxy re -encryption scheme with delegable verifiable.
Abstract: Proxy re-encryption is a public key encryption technique that allows a proxy to perform re-encryption without exposing the corresponding plaintext. As a result, proxy re-encryption has increased utility, and can be used in a number of fields including cloud computing. In previous proxy re-encryption schemes, a proxy is assumed to follow the protocol explicitly. However, this is far from the norm, and the assumption is not always true, especially in cloud computing where public cloud is considered untrusted. In this paper, we investigate the verifiability of the re-encryption process. Specifically, we first formalize the proxy re-encryption with delegatable verifiability and its corresponding security model. Then, we propose the first proxy re-encryption scheme with delegatable verifiability. Finally, security proofs of the proposal are also formally given in the proposed security models.

8 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Authentication
74.7K papers, 867.1K citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Server
79.5K papers, 1.4M citations
79% related
Routing protocol
46.5K papers, 901.8K citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202336
202275
202147
202059
201959
201869