Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,182,201 papers from all fields of science
Search
Sign In
Create Free Account
Proxy re-encryption
Proxy re-encryption schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Ciphertext
Elliptic curve cryptography
Encryption
Identity-based conditional proxy re-encryption
Expand
Broader (2)
Cryptography
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Collusion-resistant unidirectional proxy re-encryption scheme from lattices
Kee Sung Kim
,
I. Jeong
Journal of Communications and Networks
2016
Corpus ID: 17426992
Most of the previous proxy re-encryption schemes rely on the average-case hardness problems such as the integer factorization…
Expand
2014
2014
Hierarchical attribute based proxy re-encryption access control in cloud computing
P. Praveen Chandar
,
D. Mutkuraman
,
M. Rathinrai
International Conference on Circuits, Power and…
2014
Corpus ID: 15605749
Cloud computing is one of the emerging technology of IT industry in recent times. This new technology requires entrust the user's…
Expand
2013
2013
Combined Proxy Re-encryption
Sébastien Canard
,
Julien Devigne
International Conference on Information Security…
2013
Corpus ID: 23841605
Among the variants of public key encryption schemes, the proxy re-encryption primitive (PRE) allows a user, say Alice, to decide…
Expand
2012
2012
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds
Qin Liu
,
Guojun Wang
,
Jie Wu
41st International Conference on Parallel…
2012
Corpus ID: 15188240
In this paper, we propose a clock-based proxy re-encryption (C-PRE) scheme to achieve fine-grained access control and scalable…
Expand
2012
2012
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
David Nuñez
,
I. Agudo
,
Javier López
4th IEEE International Conference on Cloud…
2012
Corpus ID: 3777298
The inclusion of identity management in the cloud computing landscape represents a new business opportunity for providing what…
Expand
2011
2011
Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
Ryotaro Hayashi
,
Tatsuyuki Matsushita
,
Takuya Yoshida
,
Yoshihiro Fujii
,
K. Okada
International Workshop on Security
2011
Corpus ID: 4382719
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted for Alice (delegator) into a ciphertext for Bob…
Expand
2011
2011
Secure and Efficient IBE-PKE Proxy Re-Encryption
T. Mizuno
,
H. Doi
IEICE Transactions on Fundamentals of Electronics…
2011
Corpus ID: 36502385
In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new…
Expand
2011
2011
Multi-Use Unidirectional Proxy Re-Encryption
Jun Shao
,
Peng Liu
,
Z. Cao
,
Guiyi Wei
IEEE International Conference on Communications…
2011
Corpus ID: 8098345
This paper presents the first multi-use unidirectional proxy re-encryption scheme proven-secure against chosenciphertext attacks…
Expand
2011
2011
Zigbee security for visitors in home automation using attribute based proxy re-encryption
Hwajeong Seo
,
Howon Kim
International Symposium on Consumer Electronics
2011
Corpus ID: 23380491
ZigBee network has many advantages in terms of high availability, low power consumption and cost-effective device for…
Expand
2010
2010
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes
Liming Fang
,
W. Susilo
,
Yongjun Ren
,
Chunpeng Ge
,
Jiandong Wang
J. Digit. Content Technol. its Appl.
2010
Corpus ID: 17331791
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE