Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,668,260 papers from all fields of science
Search
Sign In
Create Free Account
Proxy re-encryption
Proxy re-encryption schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Ciphertext
Elliptic curve cryptography
Encryption
Identity-based conditional proxy re-encryption
Expand
Broader (2)
Cryptography
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud
Gaurav Pareek
,
B. Purushothama
International Conferences on Information Science…
2018
Corpus ID: 54462347
We consider a model where large number of data items, each with different access privileges for a set of users, is outsourced and…
Expand
Review
2015
Review
2015
Cloud Computing: Security, Privacy and Practice
Yang Xiang
,
B. D. Martino
,
Guilin Wang
,
Jin Li
Future generations computer systems
2015
Corpus ID: 204983195
2013
2013
Certificate-Based Proxy Re-encryption for Public Cloud Storage
Chul Sur
,
Youngho Park
,
Sanguk Shin
,
K. Rhee
,
Changho Seo
Seventh International Conference on Innovative…
2013
Corpus ID: 17073341
Recently cloud computing paradigm has increasingly become a new model in which a shared pool of configurable computing resources…
Expand
2012
2012
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds
Qin Liu
,
Guojun Wang
,
Jie Wu
41st International Conference on Parallel…
2012
Corpus ID: 15188240
In this paper, we propose a clock-based proxy re-encryption (C-PRE) scheme to achieve fine-grained access control and scalable…
Expand
2011
2011
Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
Ryotaro Hayashi
,
Tatsuyuki Matsushita
,
Takuya Yoshida
,
Yoshihiro Fujii
,
K. Okada
International Workshop on Security
2011
Corpus ID: 4382719
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted for Alice (delegator) into a ciphertext for Bob…
Expand
2011
2011
Multi-Use Unidirectional Proxy Re-Encryption
Jun Shao
,
Peng Liu
,
Z. Cao
,
Guiyi Wei
IEEE International Conference on Communications…
2011
Corpus ID: 8098345
This paper presents the first multi-use unidirectional proxy re-encryption scheme proven-secure against chosenciphertext attacks…
Expand
2011
2011
Secure and Efficient IBE-PKE Proxy Re-Encryption
T. Mizuno
,
H. Doi
IEICE Transactions on Fundamentals of Electronics…
2011
Corpus ID: 36502385
In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new…
Expand
2010
2010
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes
Liming Fang
,
W. Susilo
,
Yongjun Ren
,
Chunpeng Ge
,
Jiandong Wang
J. Digit. Content Technol. its Appl.
2010
Corpus ID: 17331791
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption…
Expand
2010
2010
Toward constant size CCA-secure multi-hop proxy re-encryption
Junru Hu
,
Xu An Wang
,
Minqing Zhang
International Conference on Signal Processing…
2010
Corpus ID: 17797660
Blaze et al. in 1998 introduced the concept of proxy re-encryption, which allows a proxy to transform a ciphertext computed under…
Expand
2008
2008
Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
Chunbo Ma
,
Jun Ao
IACR Cryptology ePrint Archive
2008
Corpus ID: 18926718
Currently, researchers have focused their attention on proxy re-encryption scheme deployed between two entities. Lots of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required