Skip to search formSkip to main contentSkip to account menu

Proxy re-encryption

Proxy re-encryption schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Most of the previous proxy re-encryption schemes rely on the average-case hardness problems such as the integer factorization… 
2014
2014
Cloud computing is one of the emerging technology of IT industry in recent times. This new technology requires entrust the user's… 
2013
2013
Among the variants of public key encryption schemes, the proxy re-encryption primitive (PRE) allows a user, say Alice, to decide… 
2012
2012
In this paper, we propose a clock-based proxy re-encryption (C-PRE) scheme to achieve fine-grained access control and scalable… 
2012
2012
The inclusion of identity management in the cloud computing landscape represents a new business opportunity for providing what… 
2011
2011
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted for Alice (delegator) into a ciphertext for Bob… 
2011
2011
In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new… 
2011
2011
This paper presents the first multi-use unidirectional proxy re-encryption scheme proven-secure against chosenciphertext attacks… 
2011
2011
ZigBee network has many advantages in terms of high availability, low power consumption and cost-effective device for… 
2010
2010
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption…