The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 1998. It, defined as proxy re-encryption, allows a semi-trusted proxy to convert a ciphertext intended for a party to another ciphertext of the same plaintext, without knowledge of the underlying plaintext and decryption key. It has been explored to many real-world applications, e.g., encrypted email forwarding. However, the intrinsic all-or-nothing share feature of proxy re-encryption yields a limitation that the share cannot be revoked. This may hinder the scalability of its applications in practice. In this paper, for the first time, we define the concept of revocability in terms of decryption rights delegation. The novel concept enables data...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
Attribute-based encryption (ABE) enables fine-grained access control over encrypted data. A practica...
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy...
The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 199...
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE)...
Proxy re-encryption is a cryptographic primitive enabling a proxy holding a re-encryption key to con...
The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and Strauss in 19...
We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate en...
The emergence of quantum computing threatens many classical cryptographic schemes, leading to the in...
International audienceProxy re-encryption is a cryptographic primitive proposed by Blaze, Bleumer an...
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. A...
In public key encryption (PKE), anonymity is essential to ensure privacy by preventing the ciphertex...
In the last decade, lattices have become one of the most powerful tools in constructing cryptographi...
Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow...
Abstract A proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (del...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
Attribute-based encryption (ABE) enables fine-grained access control over encrypted data. A practica...
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy...
The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 199...
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE)...
Proxy re-encryption is a cryptographic primitive enabling a proxy holding a re-encryption key to con...
The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and Strauss in 19...
We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate en...
The emergence of quantum computing threatens many classical cryptographic schemes, leading to the in...
International audienceProxy re-encryption is a cryptographic primitive proposed by Blaze, Bleumer an...
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. A...
In public key encryption (PKE), anonymity is essential to ensure privacy by preventing the ciphertex...
In the last decade, lattices have become one of the most powerful tools in constructing cryptographi...
Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow...
Abstract A proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (del...
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification...
Attribute-based encryption (ABE) enables fine-grained access control over encrypted data. A practica...
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy...