Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this paper, we propose an efficient C-PRE scheme, and prove its chosen-cipher text security under decisional bilinear Diffie-Hellman (DBDH) assumption in the ...
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. 153. The schemes in [1,2,3] are only secure against chosen-plaintext attacks (CPA).
In this paper, we propose an efficient C-PRE scheme which uses substantially less number of bilinear pairings when compared to the existing one [17]. We then ...
Abstract—In a proxy re-encryption (PRE) scheme a semi- trusted proxy can convert a ciphertext under Alice's public key into a ciphertext for Bob.
ABSTRACT. In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's ...
In this paper, we propose an efficient C-PRE scheme, and prove its chosen-cipher text security under decisional bilinear Diffie-Hellman (DBDH) assumption in ...
We further propose a more efficient C-PRE scheme, and prove its chosen-ciphertext security under the decisional bilinear Diffie-Hellman (DBDH) assumption in the ...
This paper proposes an efficient C-PRE scheme, and proves its chosen-cipher text security under decisional bilinear Diffie-Hellman (DBDH) assumption in the ...
We further propose a more efficient C-PRE scheme, and prove its chosen-ciphertext security under the decisional bilinear Diffie-Hellman (DBDH) assumption in the ...
Proxy re-encryption serves as a promising solution to secure the data sharing in the cloud computing. It enables a data owner to encrypt shared data in cloud ...