Proxy re-encryption: Analysis of constructions and its application to secure access delegation
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
Operator provisioning of a trustworthy workspace to a subscriber
RP D'souza, J Zhu, F Salzmann, B Kaushik… - US Patent …, 2014 - Google Patents
USU, Illed on Sep. 13, across a plurality of repositories. The method further includes (51) Int.
Cl allowing the subscriber authority to sub-provision the trust itouL o/32(2006.01) worthy …
Cl allowing the subscriber authority to sub-provision the trust itouL o/32(2006.01) worthy …
Adjustable proxy re-encryption
Methods, systems, and computer-readable storage media for proxy re-encryption of
encrypted data stored in a first database of a first server and a second database of a second …
encrypted data stored in a first database of a first server and a second database of a second …
Providing trustworthy workflow across trust boundaries
RP D'souza, J Zhu - US Patent App. 13/613,080, 2013 - Google Patents
Methods, systems and apparatuses for providing trustworthy workflow across trust
boundaries are disclosed. One method includes a curator generating a first public key (PK …
boundaries are disclosed. One method includes a curator generating a first public key (PK …
Cryptographic system, re-encryption key generation device, re-encryption device, and cryptographic computer readable medium
Y Kawai, K Takashima - US Patent App. 15/111,227, 2016 - Google Patents
An encryption device (200) outputs a ciphertext cto in which is set one of attribute
information X and attribute informa tion Vo corresponding to each other. A decryption device …
information X and attribute informa tion Vo corresponding to each other. A decryption device …
System and a method for management of confidential data
A system and a method for managing confidential data in a cloud service is provided. The
system comprises a cryptographic key service comprising two or more cryptographic key …
system comprises a cryptographic key service comprising two or more cryptographic key …
Distributed system web of trust provisioning
MJ Campagna, GB Roth - US Patent 11,626,996, 2023 - Google Patents
(57) ABSTRACT A web of trust in a distributed system is established. A root of trust for at
least two components in the distributed system validates information for the distributed …
least two components in the distributed system validates information for the distributed …
Proxy re-encryption
D Nuez, I Agudo, J Lopez - Journal of Network and Computer …, 2017 - dl.acm.org
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
Cryptographic system, re-encryption key generation device, re-encryption device, cryptographic method, and cryptographic program
Y Kawai, K Takashima - US Patent 9,344,276, 2016 - Google Patents
Proxy re-encryption (PRE) is a system which allows decryption rights for ciphertexts to be
delegated to third par ties without decrypting the ciphertexts. Non-Patent Literature 1 …
delegated to third par ties without decrypting the ciphertexts. Non-Patent Literature 1 …
Cryptographic system, encryption device, re-encryption key generation device, re-encryption device, and cryptographic program
Y Kawai, K Takashima - US Patent 9,979,536, 2018 - Google Patents
An encryption device 200 outputs a ciphertext ct including a ciphertext c and a ciphertext c.
The ciphertext c has been set with one of attribute information x and attribute information v …
The ciphertext c has been set with one of attribute information x and attribute information v …