scispace - formally typeset
Search or ask a question
Topic

Proxy re-encryption

About: Proxy re-encryption is a research topic. Over the lifetime, 708 publications have been published within this topic receiving 33624 citations.


Papers
More filters
Patent
04 May 2015
TL;DR: A certificate-based proxy re-encryption method for a device performing encryption and decryption based on certificates, a system and an encryption/decryption device using the same are disclosed in this article.
Abstract: A proxy re-encryption method for a device performing encryption and decryption based on certificates, a system and an encryption/decryption device using the same are disclosed. The certificate-based proxy re-encryption method comprises: an initialization step where an authentication center generates a public parameter by using a system master key; an encryption step for generating cipher text by using the public parameter, plain text, and a public key of a first user as input; a re-encryption key generation step for generating a re-encryption key by using a personal key corresponding to the public parameter, a certificate of the first user, and the public key of the first user, and a public key of a second user as input; and a re-encryption step where a proxy calculates a validity verifying parameter based on the cipher text, and generates re-cipher text by using the public parameter, the re-encryption key, and the cipher text as input, depending on whether the cipher text satisfies prescribed conditions regarding the validity verifying parameter.

3 citations

Proceedings ArticleDOI
26 Sep 2017
TL;DR: A semi-trusted proxy is introduced in a consumer's device and an in-device proxy re-encryption service (IPRES) architecture is proposed for efficiency in both access control management and resource usage.
Abstract: A key paradigm of Information Centric Networking (ICN) is that the content-based security, privacy and access control are deployed directly in the network layer. However, there is a gap between security in the network and application layers. This creates a vulnerable space for cyber attacks from inside a device. To address this problem, we discuss and present a guideline on ICN access control. Since a semi-trusted proxy has been seen as an advantageous solution for access control and efficiency in content sharing services, we introduce the proxy in a consumer's device and propose an in-device proxy re-encryption service (IPRES) architecture for efficiency in both access control management and resource usage.

3 citations

Proceedings ArticleDOI
07 Jun 2020
TL;DR: This work proposes a proxy re-encryption (PRE) scheme for complicated access control factors description in hybrid cloud and designs the algorithm including the key construction with multi-factor and its weight, which achieve the target of dynamic updating.
Abstract: Hybrid cloud has both the strong computing power of public cloud and easy control of private cloud. It provides users with robust services and convenience, meanwhile faces numerous security challenges. How to implement the effective access control is one of them, the purpose of which is deploying policy in private cloud to protect the ciphertext in public cloud. Furthermore, it becomes more and more difficult to describe the access control policy, which is suitable for multi-factor and dynamic updating. Considering the issues above, we propose a proxy re-encryption (PRE) scheme for complicated access control factors description in hybrid cloud. Firstly, we build the system model combining PRE with access control in hybrid cloud. Secondly, we design the algorithm for our scheme including the key construction with multi-factor and its weight, which achieve the target of dynamic updating. Finally, we analyze the security of this scheme by the mathematical method and performance by theory, experiment and comparisons with some other works. Our scheme has made the deployment of access control in hybrid cloud more reliable and scalable.

3 citations

Proceedings ArticleDOI
15 Dec 2014
TL;DR: This paper proposes a new identity-based conditional proxy re-encryption (IBCPRE) scheme, which enables Alice to implement finegrained delegation of decryption rights, and thus is more useful in many applications.
Abstract: In an identity-based proxy re-encryption (IB-PRE) scheme, a semi-trusted proxy can convert a ciphertext under Alice's identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. However, some scenarios require handle a fine-grained delegation. In this paper, by using the identity-based encryption (IBE) technique of Boneh-Boyen, we propose a new identity-based conditional proxy re-encryption (IBCPRE) scheme, which enables Alice to implement finegrained delegation of decryption rights, and thus is more useful in many applications. Our scheme has significant advantages in both computational and communicational than Shao et al.'s IBCPRE scheme.

3 citations

Journal ArticleDOI
TL;DR: This study proposed a re-encryption technique for managing data securely in the fog computing environment that allows a user to delegate the decryption authority to decrypt encrypted data using the re-Encryption method in the proxy server for efficient communication.
Abstract: Intelligent customized services are required to meet the needs of users. Data concerning the user’s environment is needed more so the situation of the user can be determined for providing a highly reliable service. In order to collect a large amount of data, the Internet of Things (IoT), which connects numerous devices through the Internet, has been developed. Cloud computing is widely used for managing data efficiently, but can delay data transmission. Therefore, fog computing has been proposed. However, the method used to manage data securely in the cloud computing environment is not efficient in the fog computing environment. Moreover, data may contain personally sensitive information. Additionally, various stakeholders may exist in relation to the access authority of the information. In this respect, there can be many vulnerabilities and threats. In response, this study proposed a re-encryption technique for managing data securely in the fog computing environment. This technique allows a user to delegate the decryption authority to decrypt encrypted data using the re-encryption method in the proxy server for efficient communication.

3 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Authentication
74.7K papers, 867.1K citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Server
79.5K papers, 1.4M citations
79% related
Routing protocol
46.5K papers, 901.8K citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202336
202275
202147
202059
201959
201869