Skip to search formSkip to main contentSkip to account menu

Proxy re-encryption

Proxy re-encryption schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
We consider a model where large number of data items, each with different access privileges for a set of users, is outsourced and… 
2016
2016
Most of the previous proxy re-encryption schemes rely on the average-case hardness problems such as the integer factorization… 
2015
2015
Nowadays, public cloud storage is gaining popularity and a growing number of users are beginning to use the public cloud storage… 
2014
2014
Proxy re-encryption PRE provides nice solutions to the delegation of decryption rights. In proxy re-encryption, the delegator… 
2013
2013
Recently cloud computing paradigm has increasingly become a new model in which a shared pool of configurable computing resources… 
2011
2011
This paper presents the first multi-use unidirectional proxy re-encryption scheme proven-secure against chosenciphertext attacks… 
2010
2010
A proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (delegator) to a ciphertext for Bob… 
2010
2010
Blaze et al. in 1998 introduced the concept of proxy re-encryption, which allows a proxy to transform a ciphertext computed under… 
2004
2004
[1] Using Geotail plasma and magnetic field data, we have statistically studied the difference in substorm-associated magnetotail…