×
This paper presents the first multi-use unidirectional proxy re-encryption scheme proven-secure against chosenciphertext attacks and collusion attacks in ...
This new cryptographic primitive allows a semi-trusted proxy with specific information (a.k.a. re-encryption key) to transform a ciphertext under a public key ...
Abstract—This paper presents the first multi-use unidirection- al proxy re-encryption scheme proven-secure against chosen- ciphertext attacks and collusion ...
Oct 15, 2010 · Multi-use is an important property for proxy re-encryptions. A multi-use PRE scheme permits the proxy (or proxies) to perform multiple re- ...
People also ask
Whenever the proxy needs to perform re-encryption, it can use rkAB to transform a ciphertext encrypted un- der pkA into a ciphertext encrypted under pkB.
This paper provides the first steps towards efficiently solving this problem, suggested for the first time 10 years ago, and presents the first multi-hop ...
A multi-use unidirectional ID-based proxy re-encryption scheme is a tuple of PPT (probabilistic polynomial time) algorithms (KeyGen, Extract, ReKeyGen, Enc, ...
ABSTRACT. In a proxy re-encryption scheme, a ciphertext for Alice can be converted into a ciphertext for Bob with the help of a semi-trusted proxy, ...
The proposal features a linear ciphertext size and decryption time in the number of translations, and is the first multi-use and unidirectional realization ...
Jun 29, 2015 · If the ciphertext can be re-encrypted many times, then the PRE scheme is multi-use; otherwise, it is single-use. The second is directionality.