Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,755,882 papers from all fields of science
Search
Sign In
Create Free Account
Proxy re-encryption
Proxy re-encryption schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Ciphertext
Elliptic curve cryptography
Encryption
Identity-based conditional proxy re-encryption
Expand
Broader (2)
Cryptography
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud
Gaurav Pareek
,
B. Purushothama
International Conferences on Information Science…
2018
Corpus ID: 54462347
We consider a model where large number of data items, each with different access privileges for a set of users, is outsourced and…
Expand
2016
2016
Collusion-resistant unidirectional proxy re-encryption scheme from lattices
Kee Sung Kim
,
I. Jeong
Journal of Communications and Networks
2016
Corpus ID: 17426992
Most of the previous proxy re-encryption schemes rely on the average-case hardness problems such as the integer factorization…
Expand
Review
2015
Review
2015
Cloud Computing: Security, Privacy and Practice
Yang Xiang
,
B. D. Martino
,
Guilin Wang
,
Jin Li
Future generations computer systems
2015
Corpus ID: 204983195
2015
2015
Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds
Yang Lu
KSII Transactions on Internet and Information…
2015
Corpus ID: 8651454
Nowadays, public cloud storage is gaining popularity and a growing number of users are beginning to use the public cloud storage…
Expand
2014
2014
Proxy Re-encryption with Unforgeable Re-encryption Keys
Hui Guo
,
Zhenfeng Zhang
,
Jiang Zhang
Cryptology and Network Security
2014
Corpus ID: 29291594
Proxy re-encryption PRE provides nice solutions to the delegation of decryption rights. In proxy re-encryption, the delegator…
Expand
2013
2013
Certificate-Based Proxy Re-encryption for Public Cloud Storage
Chul Sur
,
Youngho Park
,
Sanguk Shin
,
K. Rhee
,
Changho Seo
Seventh International Conference on Innovative…
2013
Corpus ID: 17073341
Recently cloud computing paradigm has increasingly become a new model in which a shared pool of configurable computing resources…
Expand
2011
2011
Multi-Use Unidirectional Proxy Re-Encryption
Jun Shao
,
Peng Liu
,
Z. Cao
,
Guiyi Wei
IEEE International Conference on Communications…
2011
Corpus ID: 8098345
This paper presents the first multi-use unidirectional proxy re-encryption scheme proven-secure against chosenciphertext attacks…
Expand
2010
2010
Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
Y. He
,
T. W. Chim
,
L. Hui
,
S. Yiu
IACR Cryptology ePrint Archive
2010
Corpus ID: 9128982
A proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (delegator) to a ciphertext for Bob…
Expand
2010
2010
Toward constant size CCA-secure multi-hop proxy re-encryption
Junru Hu
,
Xu An Wang
,
Minqing Zhang
International Conference on Signal Processing…
2010
Corpus ID: 17797660
Blaze et al. in 1998 introduced the concept of proxy re-encryption, which allows a proxy to transform a ciphertext computed under…
Expand
2004
2004
Difference in magnetotail variations between intense and weak substorms
Y. Miyashita
,
Y. Kamide
,
+6 authors
G. Parks
2004
Corpus ID: 54016154
[1] Using Geotail plasma and magnetic field data, we have statistically studied the difference in substorm-associated magnetotail…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE