To see the other types of publications on this topic, follow the link: Proxy Re-Encryption.

Dissertations / Theses on the topic 'Proxy Re-Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 dissertations / theses for your research on the topic 'Proxy Re-Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Sbai, Anass. "Contributions au proxy de re-chiffrement et à la délégation d'authentification." Electronic Thesis or Diss., Amiens, 2021. http://www.theses.fr/2021AMIE0032.

Full text
Abstract:
La cyber sécurité est un enjeu majeur pour le SmartGrid et les industries énergétiques. La manipulation des données issues des compteurs intelligents peut avoir des conséquences néfastes, particulièrement lorsque les systèmes de comptage sont connectés directement aux sources de production. Dans le cadre du projet VertPom, nous nous sommes intéressés à deux problématiques majeures : la confidentialité des données de consommation et les systèmes d'authentification. Pour répondre aux problématiques de confidentialité, nous avons utilisé le concept des proxy de re-chiffrement (PRE) qui permet le
APA, Harvard, Vancouver, ISO, and other styles
2

Dou, Yanzhi. "Toward Privacy-Preserving and Secure Dynamic Spectrum Access." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81882.

Full text
Abstract:
Dynamic spectrum access (DSA) technique has been widely accepted as a crucial solution to mitigate the potential spectrum scarcity problem. Spectrum sharing between the government incumbents and commercial wireless broadband operators/users is one of the key forms of DSA. Two categories of spectrum management methods for shared use between incumbent users (IUs) and secondary users (SUs) have been proposed, i.e., the server-driven method and the sensing-based method. The server-driven method employs a central server to allocate spectrum resources while considering incumbent protection. The cent
APA, Harvard, Vancouver, ISO, and other styles
3

Xiong, Huijun. "Secure Data Service Outsourcing with Untrusted Cloud." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23191.

Full text
Abstract:
Outsourcing data services to the cloud is a nature fit for cloud usage. However, increasing security and privacy concerns from both enterprises and individuals on their outsourced data inhibit this trend. In this dissertation, we introduce service-centric solutions to address two types of security threats existing in the current cloud environments: semi-honest cloud providers and malicious cloud customers. Our solution aims not only to provide confidentiality and access controllability of outsourced data with strong cryptographic guarantee, but, more importantly, to fulfill specific security r
APA, Harvard, Vancouver, ISO, and other styles
4

Nguyen, Kim Thuat. "Lightweight security protocols for IP-based Wireless Sensor Networks and the Internet of Things." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0025/document.

Full text
Abstract:
L'Internet des Objets (IdO) permet à des milliards de dispositifs informatiques embarqués de se connecter les uns aux autres. Les objets concernés couvrent la plupart de nos appareils de la vie quotidienne, tels que les thermostats, les réfrigérateurs, les fours, les machines à laver et les téléviseurs. Il est facile d'imaginer l'ampleur du danger, si ces dispositifs venaient à nous espionner et révélaient nos données personnelles. La situation serait encore pire si les applications critiques IdO, par exemple, le système de contrôle des réacteurs nucléaires, le système de sécurité du véhicule
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Kim Thuat. "Lightweight security protocols for IP-based Wireless Sensor Networks and the Internet of Things." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0025.

Full text
Abstract:
L'Internet des Objets (IdO) permet à des milliards de dispositifs informatiques embarqués de se connecter les uns aux autres. Les objets concernés couvrent la plupart de nos appareils de la vie quotidienne, tels que les thermostats, les réfrigérateurs, les fours, les machines à laver et les téléviseurs. Il est facile d'imaginer l'ampleur du danger, si ces dispositifs venaient à nous espionner et révélaient nos données personnelles. La situation serait encore pire si les applications critiques IdO, par exemple, le système de contrôle des réacteurs nucléaires, le système de sécurité du véhicule
APA, Harvard, Vancouver, ISO, and other styles
6

Suriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.

Full text
Abstract:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least
APA, Harvard, Vancouver, ISO, and other styles
7

Arfaoui, Ghada. "Conception de protocoles cryptographiques préservant la vie privée pour les services mobiles sans contact." Thesis, Orléans, 2015. http://www.theses.fr/2015ORLE2013/document.

Full text
Abstract:
Avec l'émergence de nouvelles technologies telles que le NFC (Communication à champ proche) et l'accroissement du nombre de plates-formes mobiles, les téléphones mobiles vont devenir de plus en plus indispensables dans notre vie quotidienne. Ce contexte introduit de nouveaux défis en termes de sécurité et de respect de la vie privée. Dans cette thèse, nous nous focalisons sur les problématiques liées au respect de la vie privée dans les services NFC ainsi qu’à la protection des données privées et secrets des applications mobiles dans les environnements d'exécution de confiance (TEE). Nous four
APA, Harvard, Vancouver, ISO, and other styles
8

Bellafqira, Reda. "Chiffrement homomorphe et recherche par le contenu sécurisé de données externalisées et mutualisées : Application à l'imagerie médicale et l'aide au diagnostic." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0063.

Full text
Abstract:
La mutualisation et l'externalisation de données concernent de nombreux domaines y compris celui de la santé. Au-delà de la réduction des coûts de maintenance, l'intérêt est d'améliorer la prise en charge des patients par le déploiement d'outils d'aide au diagnostic fondés sur la réutilisation des données. Dans un tel environnement, la sécurité des données (confidentialité, intégrité et traçabilité) est un enjeu majeur. C'est dans ce contexte que s'inscrivent ces travaux de thèse. Ils concernent en particulier la sécurisation des techniques de recherche d'images par le contenu (CBIR) et de « m
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Chun-Hung, and 陳俊宏. "Attribute-Based Proxy Re-Encryption." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/54484495945273108005.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>100<br>Cloud computing has been developed rapidly in recent years, and offers novel concepts and innovations in computer use. One application of cloud computing is that people can designate a proxy to help them to execute a number of tasks in certain situations instead of undertaking all tasks themselves. With this application, people can benefit from the proxy; however, some information is revealed to the proxy, such as their activities, and private data. That is, the proxy is aware of the actions of people through delegation processes, and proxy re-encryption whi
APA, Harvard, Vancouver, ISO, and other styles
10

Chiu, Yun-Peng, and 邱允鵬. "Efficient Secure Multicast Schemes Using Proxy Re-Encryption." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/26207264674691747325.

Full text
Abstract:
博士<br>國立臺灣大學<br>電機工程學研究所<br>99<br>The goal of a secure multicast communication environment is to ensure that only valid members belonging to the multicast group can decrypt data. To build a practical and secure multicast architecture, we focus on scalability and containment issues. Scalability means that the processing overhead of each security operation should be minimized in terms of the number of group members. Containment means that a security breach that occurs in one subgroup does not affect other subgroups. In this dissertation, we propose novel secure multicast schemes by exploiting a
APA, Harvard, Vancouver, ISO, and other styles
11

Chen, Hsueh-Cheng, and 陳學呈. "Secret Data Access Based on Proxy Re-encryption." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/bdsa7t.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊工程學系<br>105<br>Proxy re-encryption schemes enable users to share their digital content with other parties in a more ecient way. In existing proxy re-encryption schemes, the security issues of key exposure attack and unauthorized re-encryption and the performance challenges have been extensively considered for years. In this thesis, we point out some security aws that occurred in certain famed proxy re-encryption schemes and propose a secret data system based on an improved proxy re-encryption scheme with access control. In addition, the proposed scheme can withstand an advers
APA, Harvard, Vancouver, ISO, and other styles
12

Zheng, Yan-Hong, and 鄭彥宏. "The Research of Attribute Based Encryption Schemes with Proxy Re-Encryption Capability." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/59174700583920445832.

Full text
Abstract:
碩士<br>崑山科技大學<br>數位生活科技研究所<br>99<br>As cloud storage technological development, more and more sensitive and privacy data is stored and shared by third-party sites on the Internet. To protect data confidentiality, users generally encrypt data using their private keys, and then upload ciphertext to cloud storage servers. However, one drawback of such encryption method, is that it can be selectively shared only in non-security way (i.e., giving another party your private key). Attribute Based Encryption Scheme determines decryption ability based on a user&apos;&apos;s attributes. In this Scheme,
APA, Harvard, Vancouver, ISO, and other styles
13

Chen, Jun-Cheng, and 陳俊成. "Timed-Release Proxy Conditional Re-Encryption for Cloud Computing." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/31403077370758834835.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>99<br>The mobile technology is being developed very fast and it is a general situation where people can fetch or edit files via the Internet by mobile devices such as notebooks, smart phones, and so on. Due to possible possession of various devices of a user, it may be inconvenient for him to synchronize a file such that he cannot edit the same file via his devices easily. Recently, the cloud technology is becoming more and more popular and there are some new business models launched. One of them is a storage platform Dropbox which can synchronize users&apos;&apos;
APA, Harvard, Vancouver, ISO, and other styles
14

Hung, Yao-Min, and 洪曜民. "An Improved Multi-hop Proxy Re-encryption Scheme with CCA Security." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/bjg2ax.

Full text
Abstract:
碩士<br>國立臺灣海洋大學<br>資訊工程學系<br>105<br>In a proxy re-encryption system, a semi-trusted proxy can convert a ciphertext originally intended for Alice into a ciphertext intended for Bob, without learning the underlying plaintext. PRE can be categorized into multi-hop PRE, in which the ciphertexts can be transformed from Alice to Bob and then to Charlie and so on. According to the direction of transformation, PRE can also be categorized into bidirectional PRE, in which the proxy can transform ciphertexts from Alice to Bob and vice versa. In this paper, the author will propose a new bidirectional multi
APA, Harvard, Vancouver, ISO, and other styles
15

Huang, Yen-lin, and 黃彥霖. "Key-Aggregate Proxy Re-Encryption with Dynamic ConditionGeneration Using Multilinear Maps." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/38d2mt.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>106<br>With the growing accessibility of the internet, many people store files in the cloud storage. In consideration of privacy preserving, users tent to encrypt their files before uploading them to the cloud. Under certain conditions, a file owner may want to share the encrypted files directly on the cloud. In such cases, the file owner will delegate the re-encryption ability to a proxy with re-encryption keys. However, Chen et al. found that the size of the re-encryption key (or condition key) would increase with the number of the conditions, which motivated the
APA, Harvard, Vancouver, ISO, and other styles
16

Lin, Yu-Ting, and 林雨葶. "Applying Proxy Re-Encryption to Ciphertext Search in Cloud Data Protection Mechanism." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/39u6r7.

Full text
Abstract:
碩士<br>長庚大學<br>資訊管理學系<br>104<br>With the rapid growth of Internet applications and cost continued to decline, there are many large organizations, such as Amazon, IBM and Microsoft, adopted cloud computing technology. These organizations will transfer their internal resources to external Cloud Service Provider (CSP). It does not only greatly reduce the cost of organization expenses, but also have more competitive advantages offered by cloud service environment than traditional server. However, the cloud environment is an open shared location; the traditional protection mechanism may not be suita
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Peter Shaojui, and 王紹睿. "Design of a Privacy-Preserving Data Mining System Based on Differential Privacy Using Additive-Homomorphic Proxy Re-Encryption Protocol Against Insider Attacks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/63639699902141668295.

Full text
Abstract:
博士<br>國立臺灣大學<br>資訊工程學研究所<br>104<br>In this thesis, we consider a new insider threat for the privacy preserving work of distributed kernel-based data mining (DKBDM), such as distributed Support Vector Machine (SVM). Among several known data breaching problems, those associated with insider attacks have been rising significantly, making this one of the fastest growing types of security breaches. Once considered a negligible concern, insider attacks have risen to be one of the top three central data violations. Insider-related research involving the distribution of kernel-based data mining is lim
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!