搜索结果: 1-15 共查到“Proxy”相关记录139条 . 查询时间(0.046 秒)
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
multi-proxy multi-signature scheme multi-signature scheme ID-based signature
2019/9/16
Multi-proxy multi-signature schemes are useful in distributed networks, where a group of users cooperatively could delegate their administrative rights to the users of another group, who are authorize...
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
searchable encryption blind indexing SQL database security
2019/7/15
Rapid advances in Internet technologies have fostered the emergence of the “software as a service” model for enterprise computing. The “Database as a Service” model provides users with the power to cr...
Strong Post-Compromise Secure Proxy Re-Encryption
Proxy re-encryption key rotation post-compromise security
2019/4/11
Proxy Re-Encryption (PRE), introduced by Bellare et. al, allows a ciphertext encrypted using a key pki to be re-encrypted by a third party so that it is an encryption of the same message under a new k...
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15
NTRUReEncrypt NTRU Decryption Failure
2019/1/29
In ASIACCS 2015, Nuñez, Agudo, and Lopez proposed a proxy re-encryption scheme, NTRUReEncrypt, based on NTRU, which allows a proxy to translate ciphertext under the delegator's public key into a ...
A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
Identity-Based Proxy Re-Encryption Collusion-resistance Random Oracle
2018/11/29
Cloud storage enables its users to store confidential information as encrypted files in the cloud. A cloud user (say Alice) can share her encrypted files with another user (say Bob) by availing proxy ...
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
Proxy Re-Encryption Random Oracle Model Chosen Ciphertext Security
2018/11/29
Proxy re-encryption (PRE) enables delegation of decryption rights by entrusting a proxy server with special information, that allows it to transform a ciphertext under one public key into a ciphertext...
Universal Proxy Re-Encryption
universal proxy re-encryption proxy re-encryption public-key encryption
2018/11/16
We put forward the notion of universal proxy re-encryption (UPRE). A UPRE scheme enables us to convert a ciphertext under a (delegator) public key of any existing public-key encryption (PKE) scheme in...
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
LTE Handover authentication scheme Proxy Signature
2018/11/12
Designing a secure and efficient handover authentication scheme has always been a concern of cellular networks especially in 4G Long Term Evolution (LTE) wireless networks. What makes their handover s...
All existing security proofs for PRE only show selective security, where the adversary must first declare the users it wants to corrupt. This can be lifted to more meaningful adaptive security by gues...
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications
forward secrecy proxy re-encryption improved security model
2018/4/10
We revisit the notion of proxy re-encryption (PRE), an enhanced public-key encryption primitive envisioned by Blaze et al. (Eurocrypt'98) and formalized by Ateniese et al. (NDSS'05) for delegating dec...
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing
Proxy Re-Encryption Pairing-free Public Key
2017/9/14
Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss to provide delegation of decryption rights. A semi-trusted proxy agent re-encrypts ciphertexts under the...
Investigating predictors of eating: is resting metabolic rate really the strongest proxy of energy intake?
appetite eating behavior traits energy intake error variance resting metabolic rate
2018/11/20
Background: Evidence suggests that fat-free mass and resting metabolic rate (RMR), but not fat mass, are strong predictors of energy intake (EI). However, body composition and RMR do not explain the e...
Improved Security Notions for Proxy Re-Encryption to Enforce Access Control
Proxy re-encryption applied cryptography unidirectional
2017/9/1
Proxy Re-Encryption (PRE) allows a ciphertext encrypted under Alice's public key to be transformed to an encryption under Bob's public key without revealing either the plaintext or the decryption keys...
Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation
Proxy Re-encryption Ciphertext Delegation Hybrid Encryption
2017/9/1
We consider the problems of i) using public-key encryption to enforce dynamic access control on clouds; and ii) key rotation of data stored on clouds. Historically, proxy re-encryption, ciphertext del...