2008 IFIP International Conference on Network and Parallel Computing 2008
DOI: 10.1109/npc.2008.37
|View full text |Cite
|
Sign up to set email alerts
|

Conditional Privacy Using Re-encryption

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…We then presented the first construction under standard assumptions in the standard model. Our construction is efficient enough for several practical PRE applications, such as [1,13,10,12]. Our construction realizes CPA-security.…”
Section: Conclusion and Open Problemsmentioning
confidence: 95%
See 1 more Smart Citation
“…We then presented the first construction under standard assumptions in the standard model. Our construction is efficient enough for several practical PRE applications, such as [1,13,10,12]. Our construction realizes CPA-security.…”
Section: Conclusion and Open Problemsmentioning
confidence: 95%
“…In [12], Suriadi, Foo and Smith use proxy re-encryption to develop a credential system with conditional privacy. Their system has many proxies providing keys to parities who wish to remain anonymous.…”
Section: Applicationsmentioning
confidence: 99%
“…We compare our protocol with two alternative very popular encryption techniques, the Chaum mixing scheme and the identity based proxy re‐encryption (IB‐PRE) scheme , which have been proposed by the research community and applied in numerous scenarios, ranging from web browsing to data storage and sharing.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, this scheme guarantees unidirectionality, meaning that a user A can delegate to another user B, without permitting A to decrypt B's ciphertexts, and non‐interactivity, meaning that a user A can construct a re‐encryption key without the participation of B. The IB‐PRE has been adopted to secure communications and provide anonymity in many different frameworks .…”
Section: Introductionmentioning
confidence: 99%
“…PRE has been proven useful in many applications such as access control in encrypted email forwarding [11] , distributed file storage [12] , digital rights management (DRM) [13] [14] , privacy preserving in anonymity revocation [15] and so on.…”
Section: Introductionmentioning
confidence: 99%