Conditional identity-based broadcast proxy re-encryption and its application to cloud email

P Xu, T Jiao, Q Wu, W Wang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Recently, a number of extended Proxy Re-Encryptions (PRE), eg Conditional (CPRE),
identity-based PRE (IPRE) and broadcast PRE (BPRE), have been proposed for flexible …

On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method

D Li, D Han, TH Weng, Z Zheng, H Li, KC Li - Computer Standards & …, 2024 - Elsevier
Stablecoins have enabled the rapid growth of decentralized payments and the birth of the
new generation of payment system with cryptocurrencies and Blockchain technology …

A proxy broadcast re-encryption for cloud data sharing

M Sun, C Ge, L Fang, J Wang - Multimedia Tools and Applications, 2018 - Springer
Proxy re-encryption (PRE) enables a semi-trusted proxy to automatically convert a
delegator's ciphertext to a delegate's ciphertext without learning anything about the …

Further observation on proxy re-encryption with keyword search

XA Wang, X Huang, X Yang, L Liu, X Wu - Journal of Systems and Software, 2012 - Elsevier
Recently Shao et al. proposed an interesting cryptographic primitive called proxy re-
encryption with keyword search (PRES). The main novelty is simultaneously realizing the …

Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search

L Fang, W Susilo, C Ge, J Wang - Theoretical Computer Science, 2012 - Elsevier
Weng et al. introduced the notion of conditional proxy re-encryption (or C-PRE, for short),
whereby only the ciphertext satisfying one condition set by the delegator can be transformed …

Identity-based conditional proxy re-encryption

D Zhou, K Chen, S Liu, D Zheng - Chinese Journal of …, 2013 - ieeexplore.ieee.org
In a Idendity-based proxy re-encryption (IBPRE) scheme, a proxy, converts a ciphertext for
one identity into a ciphertext for another identity without knowing the underlying plaintext …

[HTML][HTML] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts

K Liang, CK Chu, X Tan, DS Wong, C Tang… - Theoretical Computer …, 2014 - Elsevier
Abstract Proxy Re-Encryption (PRE) allows one user to delegate the decryption rights of
his/her ciphertexts to another user. Since the introduction of Multi-Hop Identity-Based PRE …

Fine-grained and heterogeneous proxy re-encryption for secure cloud storage

P Xu, H Chen, D Zou, H ** - Chinese science bulletin, 2014 - Springer
Cloud is an emerging computing paradigm. It has drawn extensive attention from both
academia and industry. But its security issues have been considered as a critical obstacle in …

PRE+: dual of proxy re-encryption for secure cloud data sharing service

XA Wang, F Xhafa, J Ma, L Barolli… - International journal of …, 2018 - inderscienceonline.com
In this paper, aiming at providing secure cloud data sharing services in cloud storage, we
propose a scalable and controllable cloud data sharing framework for cloud users: Scanf …

Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance

G Pareek, BR Purushothama - Journal of Information Security and …, 2020 - Elsevier
Proxy Re-encryption (PRE) offers an efficient solution for enforcing access control on
outsourced data through delegation of decryption rights of a delegator to a delegatee …