Results 1  10
of
146,780
Certificateless Proxy ReEncryption Without Pairing: Revisited
, 2015
"... Proxy ReEncryption was introduced by Blaze, Bleumer and Strauss to efficiently solve the problem of delegation of decryption rights. In proxy reencryption, a semihonest proxy transforms a ciphertext intended for Alice to a ciphertext of the same message for Bob without learning anything about the ..."
Abstract
 Add to MetaCart
without pairing by extending the PKI based construction of Chow et al. proposed in 2010. We prove its security in the random oracle model under the Computational DiffieHellman (CDH) assumption. Prior to this work, the only secure certificateless proxy reencryption scheme is due to Guo et al. proposed
CCASecure Proxy Reencryption without Pairings
 of Lecture Notes in Computer Science
, 2009
"... In a proxy reencryption scheme, a semitrusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy reencryption can be used in many applications, such as en ..."
Abstract

Cited by 26 (1 self)
 Add to MetaCart
, such as encrypted email forwarding. In this paper, by using signature of knowledge and FijisakiOkamoto conversion, we propose a proxy reencryption scheme without pairings, in which the proxy can only transform the ciphertext in one direction. The proposal is secure against chosen ciphertext attack (CCA
Signcryption with Proxy Reencryption
"... Con dentiality and authenticity are two of the most fundamental problems in cryptography. Many applications require both condentiality and authenticity, and hence an e cient way to get both together was very desirable. In 1997, Zheng proposed the notion of signcryption, a single primitive which prov ..."
Abstract
 Add to MetaCart
provides both con dentiality and authenticity in a way that's more e cient than signing and encrypting separately. Proxy reencryption is a primitive that allows a semitrusted entity called the proxy to convert ciphertexts addressed to a delegator to those that can be decrypted by a delegatee
Identitybased proxy reencryption
 In ACNS ’07
, 2007
"... In a proxy reencryption scheme a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the publickey setting. In this paper, we address the problem of IdentityBased proxy reencryption, whe ..."
Abstract

Cited by 53 (0 self)
 Add to MetaCart
In a proxy reencryption scheme a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the publickey setting. In this paper, we address the problem of IdentityBased proxy reencryption
Hybrid Proxy Reencryption Between IBE And CBE
"... Abstract — In proxy reencryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy reencryption ..."
Abstract
 Add to MetaCart
Abstract — In proxy reencryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy reencryption
Improved proxy reencryption schemes with applications to secure distributed storage
 IN NDSS
, 2005
"... In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy reencryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We predict that fast and secure reencryption will become increasingly popu ..."
Abstract

Cited by 190 (16 self)
 Add to MetaCart
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy reencryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We predict that fast and secure reencryption will become increasingly
Efficient Unidirectional Proxy ReEncryption
"... Abstract. Proxy reencryption (PRE) allows a semitrusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same message for Bob. The proxy only needs a reencryption key given by Alice, and cannot learn anything about the message encrypted. This adds flexibility in ..."
Abstract

Cited by 12 (0 self)
 Add to MetaCart
Abstract. Proxy reencryption (PRE) allows a semitrusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same message for Bob. The proxy only needs a reencryption key given by Alice, and cannot learn anything about the message encrypted. This adds flexibility
Keyprivate proxy reencryption
 In CTRSA ’09: Proceedings of the The Cryptographers’ Track at the RSA Conference 2009 on Topics in Cryptology
, 2009
"... Proxy reencryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very ..."
Abstract

Cited by 12 (0 self)
 Add to MetaCart
in practice. For example, in a secure distributed file system, content owners may want to use the proxy to help reencrypt sensitive information without revealing to the proxy the identity of the recipients. In this work, we propose keyprivate (or anonymous) reencryption keys as an additional useful
NonTransferable Proxy ReEncryption
"... Abstract. Proxy reencryption (PRE) allows a semitrusted proxy to transform a ciphertext for Alice into a ciphertext of the same message for Bob. The traditional security notion of PRE focuses on preventing the proxy with the reencryption key learning anything about the encrypted messages. Howeve ..."
Abstract
 Add to MetaCart
decryption capability. However, over the last decade, no solutions have achieved this property. In this paper, we positively resolve this open problem. In particular, we give the first construction of nontransferable proxy reencryption where the attacker is allowed to obtain one pair of keys consisting
Certificateless Public Key Cryptography
 ASIACRYPT'03
, 2003
"... This paper introduces the concept of certificateless public key cryptography (CLPKC). In contrast to traditional public key cryptographic systems, CLPKC does not require the use of certificates to guarantee the authenticity of public keys. It does rely on the use of a trusted third party (TTP) who ..."
Abstract

Cited by 227 (4 self)
 Add to MetaCart
cryptography that is intermediate between traditional certificated PKC and IDPKC. We make concrete the concept of CLPKC by introducing certificateless public key encryption (CLPKE), signature and key exchange schemes. We also demonstrate how hierarchical CLPKC can be supported. The schemes are all derived
Results 1  10
of
146,780