Proxy re-encryption

Proxy re-encryption schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
We propose a new unidirectional proxy re-encryption scheme based on the hardness of the LWE problem. Our construction is… (More)
Is this relevant?
2012
2012
Proxy re‐encryption (PRE) is a public key encryption that allows a semi‐trusted proxy with some information (a.k.a., re… (More)
  • table I
  • table II
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting… (More)
  • table 1
  • table 2
  • figure 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Attribute based proxy re-encryption scheme (ABPRE) is a new cryptographic primitive which extends the traditional proxy re… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Recently, the concept of proxy re-encryption has been shown very useful in a number of applications, especially in enforcing… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one… (More)
  • figure 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different… (More)
Is this relevant?