Skip to search formSkip to main contentSkip to account menu

Proxy re-encryption

Proxy re-encryption schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
We consider a model where large number of data items, each with different access privileges for a set of users, is outsourced and… 
2013
2013
Recently cloud computing paradigm has increasingly become a new model in which a shared pool of configurable computing resources… 
2012
2012
In this paper, we propose a clock-based proxy re-encryption (C-PRE) scheme to achieve fine-grained access control and scalable… 
2011
2011
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted for Alice (delegator) into a ciphertext for Bob… 
2011
2011
This paper presents the first multi-use unidirectional proxy re-encryption scheme proven-secure against chosenciphertext attacks… 
2011
2011
In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new… 
2010
2010
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption… 
2010
2010
Blaze et al. in 1998 introduced the concept of proxy re-encryption, which allows a proxy to transform a ciphertext computed under… 
2008
2008
Currently, researchers have focused their attention on proxy re-encryption scheme deployed between two entities. Lots of…