Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On Quorum Controlled Asymmetric Proxy Re-encryption
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A forward-secure public-key encryption scheme
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Practical identity-based encryption without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Tracing Malicious Proxies in Proxy Re-encryption
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Type-Based Proxy Re-encryption and Its Construction
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Inter-domain Identity-Based Proxy Re-encryption
Information Security and Cryptology
Conditional Proxy Broadcast Re-Encryption
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
ISC '09 Proceedings of the 12th International Conference on Information Security
Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
Information Processing Letters
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
Information Sciences: an International Journal
New construction of identity-based proxy re-encryption
Proceedings of the tenth annual ACM workshop on Digital rights management
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Ciphertext policy attribute-based proxy re-encryption
ICICS'10 Proceedings of the 12th international conference on Information and communications security
New identity-based proxy re-encryption schemes to prevent collusion attacks
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Hybrid proxy re-encryption scheme for attribute-based encryption
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
Computers & Mathematics with Applications
Addressing leakage of re-encryption key in proxy re-encryption using trusted computing
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Efficient privacy preserving content based publish subscribe systems
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Fully secure unidirectional identity-based proxy re-encryption
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Identity-based data storage in cloud computing
Future Generation Computer Systems
A CCA-Secure identity-based conditional proxy re-encryption without random oracles
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
On the security of two multi-use CCA-secure proxy re-encryption schemes
International Journal of Intelligent Information and Database Systems
Hi-index | 0.00 |
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional PKI-based public key into the ciphertexts that can be decrypted by an secret key for Identity-Based Encryption, and the other one for the transformation from ciphertexts encrypted in IBE manner into the different ciphertexts that can be decrypted by the other secret key for the IBE.