scispace - formally typeset
Search or ask a question
Topic

Proxy re-encryption

About: Proxy re-encryption is a research topic. Over the lifetime, 708 publications have been published within this topic receiving 33624 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper presents an authenticated re‐encryption scheme for NDN, which offers sender authentication, data confidentiality, and support for potential receivers, and proposes a security model for sender authentication and proves that the proposed scheme is secure.

3 citations

Book ChapterDOI
Yihui Cui1, Zhiyong Peng1, Wei Song1, Xiaojuan Li1, Fangquan Cheng1, Luxiao Ding1 
05 Sep 2014
TL;DR: The proposed TGKM scheme greatly reduces the user’s computation and storage overhead and makes full use of cloud server to achieve an efficient group key management for the cryptographic cloud storage applications.
Abstract: Users are motivated to outsource their data into the cloud for its great flexibility and economic saving However, outsourcingdata to cloud also increases the risk of privacy leakA straightforward method to protect the users’privacy is to encrypt the files before outsourcingThe existing group key management methods always presume that the server is trustworthy, but cloud storage applications do not meet this condition Therefore, how to manage the group key to enable authenticated usersto access the files securely and efficientlyis still a challenging problemIn our paper, wepropose a Time-basedGroup Key Management (TGKM)algorithmforcryptographiccloud storage applications, which uses the proxy re-encryption algorithm to transfermajorcomputingtask of the group key management to the cloud serverSo, the proposed TGKM scheme greatly reduces the user’s computation and storage overhead and makes full use of cloud server to achieve an efficient group key management for the cryptographic cloud storage applicationsMoreover, we introduce a key seed mechanism to generate a time-based dynamic group key which effectively strengthens the cloud data security Our security analysis and performance evaluations both show that the proposed TGKM scheme is a secure and efficient group key management protocol for the cloud storage applications with low overheads of computation and communication

3 citations

Proceedings ArticleDOI
09 Sep 2013
TL;DR: This paper designs a secure and practical proxy re-encryption scheme, which is CCA secure under the computational Diffie-Hellman (CDH) assumption in the random oracle model, and results indicate that the scheme can be practical in cloud-based data-sharing.
Abstract: Cloud storage allows users to access and store data in clouds over the internet, and provides a cheap and reliable solution for users with the demand of data storage. One of the main challenges in public cloud storage is to protect the security of data and to efficiently share data. In the past years, several papers in the literature have used proxy re-encryption (PRE) to address this challenge, where the performance of the underlying PRE scheme is very critical to the overall performance of the cloud storage. In this paper, we dedicate to design a secure and practical PRE scheme, which is CCA secure under the computational Diffie-Hellman (CDH) assumption in the random oracle model. We evaluate the efficiency of our scheme both in theoretical comparisons with related schemes and in implementations at several security levels using the recommended elliptic curve parameters from NIST, and the results indicate that our scheme can be practical in cloud-based data-sharing.

3 citations

Book ChapterDOI
14 Dec 2020
TL;DR: In this article, a parallel Number Theoretic Transform (NTT) procedure capable of working on arbitrary precision moduli (in CRT form) was proposed to accelerate the BV-PRE and Ring-GSW PRE schemes.
Abstract: Proxy Re-Encryption (PRE) is an indispensable tool in many public-key cryptographic schemes that enables users to delegate decryption rights to other users via a proxy. In this work, we present a high performance implementation of PRE schemes on NVIDIA GPUs. We target two lattice based PRE schemes, BV-PRE and Ring-GSW PRE defined over polynomial rings. We design a parallel Number Theoretic Transform (NTT) procedure capable of working on arbitrary precision moduli (in CRT form) and demonstrate several low level and GPU optimizations techniques to accelerate the PRE schemes.

3 citations

01 Jan 2011
TL;DR: A new type-based proxy re-encryption scheme without pairings is proposed and proved against the chosen-ciphertext attack (CCA) in the random oracle model to own better efficiency and the master key security.
Abstract: Type-based proxy re-encryption is an effective and efficient cryptographic solution to ciphertext delegation and distribution,which also enables the ciphertext owners to carry out fine-grained delegation control.In this paper,we propose a new type-based proxy re-encryption scheme without pairings and prove it against the chosen-ciphertext attack(CCA) in the random oracle model.Compared with the existing type-based proxy re-encryption schemes constructed with pairings,our scheme owns better efficiency as well as the master key security.

3 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Authentication
74.7K papers, 867.1K citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Server
79.5K papers, 1.4M citations
79% related
Routing protocol
46.5K papers, 901.8K citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202336
202275
202147
202059
201959
201869