2010
DOI: 10.1007/978-3-642-12678-9_19
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Unidirectional Proxy Re-Encryption

Abstract: Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re-encryption key given by Alice, and cannot learn anything about the plaintext encrypted. This adds flexibility in various applications, such as confidential email, digital right management and distributed storage. In this paper, we study unidirectional PRE, which the re-encryption key only enables delegation in one directi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
86
0
5

Year Published

2013
2013
2021
2021

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 147 publications
(98 citation statements)
references
References 26 publications
(46 reference statements)
0
86
0
5
Order By: Relevance
“…With a proxy server, the PRE primitive can transfer a ciphertext designated for one user to another ciphertext designated for another user without knowing the plaintext content of data. After that, many PRE schemes have been proposed for the improved security or efficiency [29][30][31]. In 2006, Ateniese et al [32] then improved the concept of PRE and employed it for remote data storage.…”
Section: Secure Data Sharing With Ibe and Prementioning
confidence: 99%
“…With a proxy server, the PRE primitive can transfer a ciphertext designated for one user to another ciphertext designated for another user without knowing the plaintext content of data. After that, many PRE schemes have been proposed for the improved security or efficiency [29][30][31]. In 2006, Ateniese et al [32] then improved the concept of PRE and employed it for remote data storage.…”
Section: Secure Data Sharing With Ibe and Prementioning
confidence: 99%
“…His scheme theoretically allows any information processing against ciphertext at impractical computational cost. Compared to his work, proxy re-encryption requires very restricted processing and many schemes have been proposed in order to achieve several different security properties [2], [4], [5], [6], [9], [10], [11], [12]. They are based on asymmetric key encryption mechanisms and provide rich flexibility in operation, but their computational cost for processing is still quite large, therefore not suitable for large scale systems such as public services.…”
Section: Related Workmentioning
confidence: 99%
“…The security parameters of the experiment are set as follows. The group order |G| in the public-key encryption schemes, [6], [3], [8] is 512 bits and the length of symmetric key used to encrypt social content is 128 bits.…”
Section: Security and Performance Analysismentioning
confidence: 99%