Results 1  10
of
30,692
Securely Obfuscating Reencryption
 Theory of Cryptography Conference TCC
, 2007
"... We present a positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to wellknown impossibility results [3] for general obfuscation and recent impossibility and improbability [13] results for obfuscation of many cryptographic functionalitie ..."
Abstract

Cited by 20 (0 self)
 Add to MetaCart
functionalities. Whereas other positive obfuscation results in the standard model apply to very simple point functions, our obfuscation result applies to the significantly more complex and widelyused reencryption functionality. This functionality takes a ciphertext for message m encrypted under Alice’s public
Unidirectional ChosenCiphertext Secure Proxy ReEncryption
 In PKC’08, LNCS
"... Abstract. In 1998, Blaze, Bleumer and Strauss introduced a cryptographic primitive called proxy reencryption (PRE) in which a proxy can transform – without seeing the plaintext – a ciphertext encrypted under one key into an encryption of the same plaintext under another key. The concept has recentl ..."
Abstract

Cited by 38 (1 self)
 Add to MetaCart
Abstract. In 1998, Blaze, Bleumer and Strauss introduced a cryptographic primitive called proxy reencryption (PRE) in which a proxy can transform – without seeing the plaintext – a ciphertext encrypted under one key into an encryption of the same plaintext under another key. The concept has
CCASecure Proxy Reencryption without Pairings
 of Lecture Notes in Computer Science
, 2009
"... In a proxy reencryption scheme, a semitrusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy reencryption can be used in many applications, such as en ..."
Abstract

Cited by 26 (1 self)
 Add to MetaCart
In a proxy reencryption scheme, a semitrusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy reencryption can be used in many applications
Keyprivate proxy reencryption
 In CTRSA ’09: Proceedings of the The Cryptographers’ Track at the RSA Conference 2009 on Topics in Cryptology
, 2009
"... Proxy reencryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very ..."
Abstract

Cited by 12 (0 self)
 Add to MetaCart
Proxy reencryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations
PRE +: Dual of Proxy Reencryption and Its Application
"... Abstract. In Eurocrypt’98, Blaze et al. introduced the concept of proxy reencryption (PRE). It allows a semitrusted proxy to convert a ciphertext originally intended for Alice into one which can be decrypted by Bob, without the proxy knowing the corresponding plaintext. PRE has found many applicat ..."
Abstract
 Add to MetaCart
Abstract. In Eurocrypt’98, Blaze et al. introduced the concept of proxy reencryption (PRE). It allows a semitrusted proxy to convert a ciphertext originally intended for Alice into one which can be decrypted by Bob, without the proxy knowing the corresponding plaintext. PRE has found many
Efficient Unidirectional Proxy ReEncryption
"... Abstract. Proxy reencryption (PRE) allows a semitrusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same message for Bob. The proxy only needs a reencryption key given by Alice, and cannot learn anything about the message encrypted. This adds flexibility in ..."
Abstract

Cited by 12 (0 self)
 Add to MetaCart
Abstract. Proxy reencryption (PRE) allows a semitrusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same message for Bob. The proxy only needs a reencryption key given by Alice, and cannot learn anything about the message encrypted. This adds flexibility
Functional reencryption and collusionresistant obfuscation, in
 9th Theory of Cryptography Conference (TCC), volume 7194 of Lecture Notes in Computer Science
, 2012
"... We introduce a natural cryptographic functionality called functional reencryption. Informally, this functionality, for a publickey encryption scheme and a function F with n possible outputs, transforms (“reencrypts”) an encryption of a message m under an “input public key” pk into an encryption o ..."
Abstract

Cited by 5 (1 self)
 Add to MetaCart
construction of a functional reencryption scheme for any function F with a polynomialsize domain and show that it satisfies this notion of collusionresistant obfuscation. We note that collusionresistant security can be viewed as a special case of dependent auxiliary input security (a setting where
ChosenCiphertext Secure Proxy ReEncryption
 In Proc. of ACMCCS’007
, 2007
"... In a proxy reencryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a different key. The proxy cannot, however, learn anything about the messages encrypted under either key. PRE schemes have ma ..."
Abstract

Cited by 63 (1 self)
 Add to MetaCart
In a proxy reencryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a different key. The proxy cannot, however, learn anything about the messages encrypted under either key. PRE schemes have
Signcryption with Proxy Reencryption
"... Con dentiality and authenticity are two of the most fundamental problems in cryptography. Many applications require both condentiality and authenticity, and hence an e cient way to get both together was very desirable. In 1997, Zheng proposed the notion of signcryption, a single primitive which prov ..."
Abstract
 Add to MetaCart
provides both con dentiality and authenticity in a way that's more e cient than signing and encrypting separately. Proxy reencryption is a primitive that allows a semitrusted entity called the proxy to convert ciphertexts addressed to a delegator to those that can be decrypted by a delegatee
Identitybased proxy reencryption
 In ACNS ’07
, 2007
"... In a proxy reencryption scheme a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the publickey setting. In this paper, we address the problem of IdentityBased proxy reencryption, whe ..."
Abstract

Cited by 53 (0 self)
 Add to MetaCart
In a proxy reencryption scheme a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the publickey setting. In this paper, we address the problem of IdentityBased proxy reencryption
Results 1  10
of
30,692