Proxy re-encryption: Analysis of constructions and its application to secure access delegation

D Nuñez, I Agudo, J Lopez - Journal of Network and Computer Applications, 2017 - Elsevier
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …

Operator provisioning of a trustworthy workspace to a subscriber

RP D'souza, J Zhu, F Salzmann, B Kaushik… - US Patent …, 2014 - Google Patents
USU, Illed on Sep. 13, across a plurality of repositories. The method further includes (51) Int.
Cl allowing the subscriber authority to sub-provision the trust itouL o/32(2006.01) worthy …

Adjustable proxy re-encryption

I Hang, F Kerschbaum, M Kohler, M Haerterich… - US Patent …, 2017 - Google Patents
Methods, systems, and computer-readable storage media for proxy re-encryption of
encrypted data stored in a first database of a first server and a second database of a second …

Providing trustworthy workflow across trust boundaries

RP D'souza, J Zhu - US Patent App. 13/613,080, 2013 - Google Patents
Methods, systems and apparatuses for providing trustworthy workflow across trust
boundaries are disclosed. One method includes a curator generating a first public key (PK …

Cryptographic system, re-encryption key generation device, re-encryption device, and cryptographic computer readable medium

Y Kawai, K Takashima - US Patent App. 15/111,227, 2016 - Google Patents
An encryption device (200) outputs a ciphertext cto in which is set one of attribute
information X and attribute informa tion Vo corresponding to each other. A decryption device …

System and a method for management of confidential data

IB Damgård, TP Jakobsen, JI Pagter - US Patent 10,354,084, 2019 - Google Patents
A system and a method for managing confidential data in a cloud service is provided. The
system comprises a cryptographic key service comprising two or more cryptographic key …

Distributed system web of trust provisioning

MJ Campagna, GB Roth - US Patent 11,626,996, 2023 - Google Patents
(57) ABSTRACT A web of trust in a distributed system is established. A root of trust for at
least two components in the distributed system validates information for the distributed …

Proxy re-encryption

D Nuez, I Agudo, J Lopez - Journal of Network and Computer …, 2017 - dl.acm.org
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …

Cryptographic system, re-encryption key generation device, re-encryption device, cryptographic method, and cryptographic program

Y Kawai, K Takashima - US Patent 9,344,276, 2016 - Google Patents
Proxy re-encryption (PRE) is a system which allows decryption rights for ciphertexts to be
delegated to third par ties without decrypting the ciphertexts. Non-Patent Literature 1 …

Cryptographic system, encryption device, re-encryption key generation device, re-encryption device, and cryptographic program

Y Kawai, K Takashima - US Patent 9,979,536, 2018 - Google Patents
An encryption device 200 outputs a ciphertext ct including a ciphertext c and a ciphertext c.
The ciphertext c has been set with one of attribute information x and attribute information v …