Proxy re-signatures: new definitions, algorithms, and applications
Proceedings of the 12th ACM conference on Computer and communications security
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Decentralized group key management for dynamic networks using proxy cryptography
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Chosen-ciphertext secure proxy re-encryption
Proceedings of the 14th ACM conference on Computer and communications security
Stateful identity-based encryption scheme: faster encryption and decryption
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Fully Secure Identity Based Proxy Re-Encryption Schemes in the Standard Model
ICCSIT '08 Proceedings of the 2008 International Conference on Computer Science and Information Technology
Multi-use unidirectional proxy re-signatures
Proceedings of the 15th ACM conference on Computer and communications security
RSA-TBOS signcryption with proxy re-encryption
Proceedings of the 8th ACM workshop on Digital rights management
Hi-index | 0.00 |
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol should be key independent to avoid compromising the private keys of the sender and the recipient. PRE should also be secure from signature re-usability, where unreliable proxies store and re-use the signatures without the authorization of the signature bearer. This is achieved by ensuring that PRE algorithm is unidirectional, key independent and the signature is dynamic. The proposed approach uses identity and secret key to prevent plain text and collusion attacks while ensuring that the delegator approves every signature used on his behalf. The algorithm used to generate the private/public keys is different from that generating the secret key. The proposed approach is secure even in unreliable proxies.