Conditional proxy re-encryption secure against chosen-ciphertext attack

@inproceedings{Weng2009ConditionalPR,
  title={Conditional proxy re-encryption secure against chosen-ciphertext attack},
  author={Jian Weng and Robert H. Deng and Xuhua Ding and Cheng-Kang Chu and Junzuo Lai},
  booktitle={AsiaCCS},
  year={2009}
}
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications requiring delegation. However, it is inadequate to handle scenarios where a fine-grained delegation is demanded. To overcome the limitation of existing PRE systems, we introduce the notion of conditional proxy re-encryption (C-PRE), whereby only ci-phertext satisfying a specific… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 78 CITATIONS, ESTIMATED 75% COVERAGE

A Secure Multimedia Data Sharing Scheme for Wireless Network

  • Security and Communication Networks
  • 2018
VIEW 9 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing

  • 2016 11th International Conference on Availability, Reliability and Security (ARES)
  • 2016
VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Interactive conditional proxy re-encryption with fine grain policy

  • Journal of Systems and Software
  • 2011
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

K-times Proxy Re-encryption

  • 2011 Seventh International Conference on Computational Intelligence and Security
  • 2011
VIEW 8 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds

  • 2018 IEEE Conference on Dependable and Secure Computing (DSC)
  • 2018
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Provably Secure Certificate-based Conditional Proxy Re-encryption

  • J. Inf. Sci. Eng.
  • 2016
VIEW 12 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2009
2019

CITATION STATISTICS

  • 10 Highly Influenced Citations

  • Averaged 9 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-6 OF 6 REFERENCES

Chosen-ciphertext secure proxy re-encryption

  • ACM Conference on Computer and Communications Security
  • 2007
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Identity-Based Proxy Re-encryption

  • IACR Cryptology ePrint Archive
  • 2006
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption

  • Public Key Cryptography
  • 2008
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…