A cloud-based re-encryption scheme allows a semi-trusted cloud proxy to convert a ciphertext under delegator\u27s public-key into a ciphertext of delegatee\u27s. However, for an untrusted cloud proxy, as the re-encryption program was outsourced on the cloud, the cloud can debug the program and might have illegal activities in practice, such as monitoring the program executing, returning an incorrect re-encryption ciphertext, or colluding with the participants to obtain the sensitive information. In this work, we propose a construction of cloud-based verifiable re-encryption by incorporating new cryptographic primitives of indistinguishability obfuscation and puncturable pseudorandom functions, which can achieve the master-secret security ev...
In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a d...
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted ...
Over years, cloud computing has been rapidly changing the shape of modern computing environment. The...
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-encryption (ABPRE) h...
This paper addresses the always online behavior of the data owner in proxy re- encryption schemes fo...
In order to solve the challenges of user data security in the cloud computing (storage) environment,...
Abstract. Identity-based encryption (IBE) eliminates the necessity of having a costly certificate ve...
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
2017, Springer International Publishing AG. Outsource local data to remote cloud has become prevalen...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
With the ever-growing production of data coming from multiple, scattered, highly dynamical sources (...
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate t...
Due to cost-efficiency and less hands-on management, data owners are outsourcing their data to the c...
Abstract- A data distributor has given sensitive data to a set of supposedly trusted agents (third p...
In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a d...
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted ...
Over years, cloud computing has been rapidly changing the shape of modern computing environment. The...
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-encryption (ABPRE) h...
This paper addresses the always online behavior of the data owner in proxy re- encryption schemes fo...
In order to solve the challenges of user data security in the cloud computing (storage) environment,...
Abstract. Identity-based encryption (IBE) eliminates the necessity of having a costly certificate ve...
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
2017, Springer International Publishing AG. Outsource local data to remote cloud has become prevalen...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
With the ever-growing production of data coming from multiple, scattered, highly dynamical sources (...
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate t...
Due to cost-efficiency and less hands-on management, data owners are outsourcing their data to the c...
Abstract- A data distributor has given sensitive data to a set of supposedly trusted agents (third p...
In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a d...
A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted ...
Over years, cloud computing has been rapidly changing the shape of modern computing environment. The...