Academic literature on the topic 'Proxy Re-Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Proxy Re-Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Proxy Re-Encryption"

1

Shao, Jun, Peng Liu, Guiyi Wei, and Yun Ling. "Anonymous proxy re-encryption." Security and Communication Networks 5, no. 5 (2011): 439–49. http://dx.doi.org/10.1002/sec.326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Juyan, Zhiqi Qiao, Kejia Zhang, and Chen Cui. "A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing." Sensors 21, no. 1 (2021): 288. http://dx.doi.org/10.3390/s21010288.

Full text
Abstract:
The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can homomorphically calculate the original ciphertext and re-encryption ciphertext belonging to the same user, so it is especially suitable for cloud computing. Yin et al. put forward the concept of a strong collusion attack on a proxy re-encryption scheme, and carried out a strong collusion attack on the scheme through an example. The existing homomorp
APA, Harvard, Vancouver, ISO, and other styles
3

Fang, LiMing, JianDong Wang, ChunPeng Ge, and YongJun Ren. "Fuzzy conditional proxy re-encryption." Science China Information Sciences 56, no. 5 (2012): 1–13. http://dx.doi.org/10.1007/s11432-012-4623-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fang, Liming, Willy Susilo, Chunpeng Ge, and Jiandong Wang. "Hierarchical conditional proxy re-encryption." Computer Standards & Interfaces 34, no. 4 (2012): 380–89. http://dx.doi.org/10.1016/j.csi.2012.01.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Guo, Hui, Zhenfeng Zhang, Jing Xu, and Ningyu An. "Non-transferable Proxy Re-encryption." Computer Journal 62, no. 4 (2018): 490–506. http://dx.doi.org/10.1093/comjnl/bxy096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Chih-Hung, and Pei-Jyun Lu. "Certificateless Broadcast Proxy Re-encryption With Group-Oriented Model." International Journal of Computer and Communication Engineering 5, no. 5 (2016): 358–66. http://dx.doi.org/10.17706/ijcce.2016.5.5.358-366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jiang, Zheng Tao, Yi Peng Zhang, Chen Li, Pian Niu, and Xiao Li Huang. "Survey and Analysis on Proxy Re-Encryption Schemes." Advanced Materials Research 912-914 (April 2014): 1538–43. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1538.

Full text
Abstract:
Proxy re-encryption is an efficient solution to ciphertext delegation and distribution, which also enables the sender to carry out fine-grained control on his ciphertext. This paper summarizes the progress on the proxy re-encryption schemes and their practical applications. Universal models for proxy re-encryption and its security are also induced for detailed investigation on different types of PRE schemes.
APA, Harvard, Vancouver, ISO, and other styles
8

Luo, Fucai, and Saif Al-Kuwari. "Revocable attribute-based proxy re-encryption." Journal of Mathematical Cryptology 15, no. 1 (2021): 465–82. http://dx.doi.org/10.1515/jmc-2020-0039.

Full text
Abstract:
Abstract Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into a ciphertext under another access policy, without revealing any information about the underlying plaintext. This primitive is very useful in applications where encrypted data need to be stored in untrusted environments, such as cloud storage. In many practical applications, and in order to address scenarios where users misbehave or the
APA, Harvard, Vancouver, ISO, and other styles
9

Meng, Xian Yong, Zhong Chen, Xiang Yu Meng, and Bing Sun. "An Identity-Based Conditional Proxy Re-Encryption in Cloud Computing Environments." Applied Mechanics and Materials 571-572 (June 2014): 74–78. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.74.

Full text
Abstract:
In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a delegator provides a re-encryption key satisfying one condition to a semi-trusted proxy who can convert a ciphertext encrypted under the delegator’s public key into one that can be decrypted using the delegatee’s private key. We address the identity-based proxy re-encryption scheme, where the delegator and the delegatee request keys from a trusted party known as a key generator center (KGC), who generates private keys for delegator and delegatee based on their identities. Meanwhile, the identity-
APA, Harvard, Vancouver, ISO, and other styles
10

Son, Junggab, Heekuck Oh, and SangJin Kim. "A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme." Journal of the Korea Institute of Information Security and Cryptology 23, no. 2 (2013): 147–55. http://dx.doi.org/10.13089/jkiisc.2013.23.2.147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Proxy Re-Encryption"

1

Sbai, Anass. "Contributions au proxy de re-chiffrement et à la délégation d'authentification." Electronic Thesis or Diss., Amiens, 2021. http://www.theses.fr/2021AMIE0032.

Full text
Abstract:
La cyber sécurité est un enjeu majeur pour le SmartGrid et les industries énergétiques. La manipulation des données issues des compteurs intelligents peut avoir des conséquences néfastes, particulièrement lorsque les systèmes de comptage sont connectés directement aux sources de production. Dans le cadre du projet VertPom, nous nous sommes intéressés à deux problématiques majeures : la confidentialité des données de consommation et les systèmes d'authentification. Pour répondre aux problématiques de confidentialité, nous avons utilisé le concept des proxy de re-chiffrement (PRE) qui permet le
APA, Harvard, Vancouver, ISO, and other styles
2

Dou, Yanzhi. "Toward Privacy-Preserving and Secure Dynamic Spectrum Access." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81882.

Full text
Abstract:
Dynamic spectrum access (DSA) technique has been widely accepted as a crucial solution to mitigate the potential spectrum scarcity problem. Spectrum sharing between the government incumbents and commercial wireless broadband operators/users is one of the key forms of DSA. Two categories of spectrum management methods for shared use between incumbent users (IUs) and secondary users (SUs) have been proposed, i.e., the server-driven method and the sensing-based method. The server-driven method employs a central server to allocate spectrum resources while considering incumbent protection. The cent
APA, Harvard, Vancouver, ISO, and other styles
3

Xiong, Huijun. "Secure Data Service Outsourcing with Untrusted Cloud." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23191.

Full text
Abstract:
Outsourcing data services to the cloud is a nature fit for cloud usage. However, increasing security and privacy concerns from both enterprises and individuals on their outsourced data inhibit this trend. In this dissertation, we introduce service-centric solutions to address two types of security threats existing in the current cloud environments: semi-honest cloud providers and malicious cloud customers. Our solution aims not only to provide confidentiality and access controllability of outsourced data with strong cryptographic guarantee, but, more importantly, to fulfill specific security r
APA, Harvard, Vancouver, ISO, and other styles
4

Nguyen, Kim Thuat. "Lightweight security protocols for IP-based Wireless Sensor Networks and the Internet of Things." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0025/document.

Full text
Abstract:
L'Internet des Objets (IdO) permet à des milliards de dispositifs informatiques embarqués de se connecter les uns aux autres. Les objets concernés couvrent la plupart de nos appareils de la vie quotidienne, tels que les thermostats, les réfrigérateurs, les fours, les machines à laver et les téléviseurs. Il est facile d'imaginer l'ampleur du danger, si ces dispositifs venaient à nous espionner et révélaient nos données personnelles. La situation serait encore pire si les applications critiques IdO, par exemple, le système de contrôle des réacteurs nucléaires, le système de sécurité du véhicule
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Kim Thuat. "Lightweight security protocols for IP-based Wireless Sensor Networks and the Internet of Things." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0025.

Full text
Abstract:
L'Internet des Objets (IdO) permet à des milliards de dispositifs informatiques embarqués de se connecter les uns aux autres. Les objets concernés couvrent la plupart de nos appareils de la vie quotidienne, tels que les thermostats, les réfrigérateurs, les fours, les machines à laver et les téléviseurs. Il est facile d'imaginer l'ampleur du danger, si ces dispositifs venaient à nous espionner et révélaient nos données personnelles. La situation serait encore pire si les applications critiques IdO, par exemple, le système de contrôle des réacteurs nucléaires, le système de sécurité du véhicule
APA, Harvard, Vancouver, ISO, and other styles
6

Suriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.

Full text
Abstract:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least
APA, Harvard, Vancouver, ISO, and other styles
7

Arfaoui, Ghada. "Conception de protocoles cryptographiques préservant la vie privée pour les services mobiles sans contact." Thesis, Orléans, 2015. http://www.theses.fr/2015ORLE2013/document.

Full text
Abstract:
Avec l'émergence de nouvelles technologies telles que le NFC (Communication à champ proche) et l'accroissement du nombre de plates-formes mobiles, les téléphones mobiles vont devenir de plus en plus indispensables dans notre vie quotidienne. Ce contexte introduit de nouveaux défis en termes de sécurité et de respect de la vie privée. Dans cette thèse, nous nous focalisons sur les problématiques liées au respect de la vie privée dans les services NFC ainsi qu’à la protection des données privées et secrets des applications mobiles dans les environnements d'exécution de confiance (TEE). Nous four
APA, Harvard, Vancouver, ISO, and other styles
8

Bellafqira, Reda. "Chiffrement homomorphe et recherche par le contenu sécurisé de données externalisées et mutualisées : Application à l'imagerie médicale et l'aide au diagnostic." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0063.

Full text
Abstract:
La mutualisation et l'externalisation de données concernent de nombreux domaines y compris celui de la santé. Au-delà de la réduction des coûts de maintenance, l'intérêt est d'améliorer la prise en charge des patients par le déploiement d'outils d'aide au diagnostic fondés sur la réutilisation des données. Dans un tel environnement, la sécurité des données (confidentialité, intégrité et traçabilité) est un enjeu majeur. C'est dans ce contexte que s'inscrivent ces travaux de thèse. Ils concernent en particulier la sécurisation des techniques de recherche d'images par le contenu (CBIR) et de « m
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Chun-Hung, and 陳俊宏. "Attribute-Based Proxy Re-Encryption." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/54484495945273108005.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>100<br>Cloud computing has been developed rapidly in recent years, and offers novel concepts and innovations in computer use. One application of cloud computing is that people can designate a proxy to help them to execute a number of tasks in certain situations instead of undertaking all tasks themselves. With this application, people can benefit from the proxy; however, some information is revealed to the proxy, such as their activities, and private data. That is, the proxy is aware of the actions of people through delegation processes, and proxy re-encryption whi
APA, Harvard, Vancouver, ISO, and other styles
10

Chiu, Yun-Peng, and 邱允鵬. "Efficient Secure Multicast Schemes Using Proxy Re-Encryption." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/26207264674691747325.

Full text
Abstract:
博士<br>國立臺灣大學<br>電機工程學研究所<br>99<br>The goal of a secure multicast communication environment is to ensure that only valid members belonging to the multicast group can decrypt data. To build a practical and secure multicast architecture, we focus on scalability and containment issues. Scalability means that the processing overhead of each security operation should be minimized in terms of the number of group members. Containment means that a security breach that occurs in one subgroup does not affect other subgroups. In this dissertation, we propose novel secure multicast schemes by exploiting a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Proxy Re-Encryption"

1

Conditional Identity Broadcast based Proxy Re-Encryption Technique for Data Encryption in Cloud. ASDF International, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Proxy Re-Encryption"

1

Weng, Jian, and Junzuo Lai. "Proxy Re-encryption." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1453-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weng, Jian, and Junzuo Lai. "Proxy Re-encryption." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Canard, Sébastien, and Julien Devigne. "Combined Proxy Re-encryption." In Information Security and Cryptology -- ICISC 2013. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12160-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Döttling, Nico, and Ryo Nishimaki. "Universal Proxy Re-Encryption." In Public-Key Cryptography – PKC 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75245-3_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Guo, Hui, Zhenfeng Zhang, and Jiang Zhang. "Proxy Re-encryption with Unforgeable Re-encryption Keys." In Cryptology and Network Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fuchsbauer, Georg, Chethan Kamath, Karen Klein, and Krzysztof Pietrzak. "Adaptively Secure Proxy Re-encryption." In Public-Key Cryptography – PKC 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17259-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chu, Cheng-Kang, Jian Weng, Sherman S. M. Chow, Jianying Zhou, and Robert H. Deng. "Conditional Proxy Broadcast Re-Encryption." In Information Security and Privacy. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02620-1_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Green, Matthew, and Giuseppe Ateniese. "Identity-Based Proxy Re-encryption." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72738-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kirshanova, Elena. "Proxy Re-encryption from Lattices." In Public-Key Cryptography – PKC 2014. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54631-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ateniese, Giuseppe, Karyn Benson, and Susan Hohenberger. "Key-Private Proxy Re-encryption." In Topics in Cryptology – CT-RSA 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00862-7_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Proxy Re-Encryption"

1

Demir, Busranur Bulbul, and Deniz Turgay Altilar. "Distributed Proxy Re- Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption." In 2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 2024. http://dx.doi.org/10.1109/blackseacom61746.2024.10646222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mahalakshmi, E., A. Vaidhegi, D. Jayakumar, M. O. Ramkumar, and R. Rajmohan. "Securing Cloud-based Data Sharing with Accountable Proxy Re-Encryption." In 2024 4th International Conference on Intelligent Technologies (CONIT). IEEE, 2024. http://dx.doi.org/10.1109/conit61985.2024.10626550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhong, WeiDong, Xu An Wang, Ziqing Wang, and Yi Ding. "Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bellafqira, Reda, Gouenou Coatrieux, Dalel Bouslimi, Gwénolé Quellec, and Michel Cozic. "Proxy Re-Encryption Based on Homomorphic Encryption." In ACSAC 2017: 2017 Annual Computer Security Applications Conference. ACM, 2017. http://dx.doi.org/10.1145/3134600.3134616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Peng, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, and Deqing Zou. "Generally Hybrid Proxy Re-Encryption." In ASIA CCS '16: ACM Asia Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2897845.2897923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Xu An, Ziqing Wang, Yi Ding, and Shujun Bai. "K-times Proxy Re-encryption." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Xu an, and Xiaoyuan Yang. "On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature." In 2009 Ninth IEEE International Conference on Computer and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/cit.2009.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

He, Yi-Jun, Tat Wing Chim, Lucas Chi Kwong Hui, and Siu-Ming Yiu. "Non-Transferable Proxy Re-Encryption Scheme." In 2012 5th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2012. http://dx.doi.org/10.1109/ntms.2012.6208714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mo, Lequn, and Guoxiang Yao. "Multi-Use Conditional Proxy Re-encryption." In 2013 International Conference on Information Science and Cloud Computing Companion (ISCC-C). IEEE, 2013. http://dx.doi.org/10.1109/iscc-c.2013.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Thangam, V., and K. Chandrasekaran. "Elliptic Curve Based Proxy Re-Encryption." In the Second International Conference. ACM Press, 2016. http://dx.doi.org/10.1145/2905055.2905337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!