X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
proxy re-encryption (512) 512
encryption (239) 239
cloud computing (228) 228
computer science, information systems (133) 133
proxy (110) 110
access control (105) 105
cryptography (99) 99
security (92) 92
privacy (87) 87
public key (80) 80
telecommunications (80) 80
servers (74) 74
computer science (72) 72
verschlüsselung (71) 71
identity-based encryption (68) 68
engineering, electrical & electronic (67) 67
attribute-based encryption (61) 61
computer science, theory & methods (60) 60
data encryption (58) 58
proxy client servers (58) 58
analysis (54) 54
cloud storage (51) 51
algorithms (48) 48
entschlüsselung (47) 47
computer science, software engineering (46) 46
data security (46) 46
chosen-ciphertext security (42) 42
computer information security (38) 38
data retrieval (35) 35
data storage (35) 35
computer science, hardware & architecture (34) 34
data sharing (34) 34
secure (34) 34
conditional proxy re-encryption (31) 31
standard model (30) 30
computer communication networks (29) 29
öffentlicher schlüssel (29) 29
authentication (28) 28
computer security (28) 28
cloud-computing (26) 26
games (26) 26
public-key encryption (25) 25
mathematical models (23) 23
re-encryption (23) 23
computation (22) 22
efficient (22) 22
homomorphic encryption (22) 22
protocols (22) 22
scheme (22) 22
transforms (22) 22
keyword search (21) 21
besitzer (20) 20
cloud-storage (20) 20
data privacy (20) 20
electronic mail (20) 20
outsourcing (20) 20
zugriffskontrolle (20) 20
computer simulation (19) 19
construction (19) 19
educational institutions (19) 19
geheimer schlüssel (19) 19
methods (19) 19
random oracle model (19) 19
server (19) 19
bilinear pairing (18) 18
algorithm analysis and problem complexity (17) 17
authentifizierung (17) 17
datensicherheit (17) 17
messages (17) 17
searchable encryption (17) 17
lattices (16) 16
receivers (16) 16
research (16) 16
big data (15) 15
cloud (15) 15
confidentiality (15) 15
internet (15) 15
internet of things (15) 15
public key encryption (15) 15
attribute based encryption (14) 14
cca security (14) 14
information storage and retrieval (14) 14
proxy re‐encryption (14) 14
public key cryptography (14) 14
anonymity (13) 13
bilinear maps (13) 13
chosen ciphertext security (13) 13
ciphers (13) 13
computational modeling (13) 13
engineering (13) 13
information security (13) 13
management of computing and information systems (13) 13
public-key-kryptosystem (13) 13
sicherheitsanalyse (13) 13
broadcast encryption (12) 12
digital rights management (12) 12
fine-grained access control (12) 12
gewährleistung (12) 12
information sharing (12) 12
multi-use (12) 12
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Information Theory, ISSN 0018-9448, 03/2011, Volume 57, Issue 3, pp. 1786 - 1802
In 1998, Blaze, Bleumer and Strauss introduced a cryptographic primitive called proxy re-encryption in which a proxy can transform-without seeing the plaintext-a ciphertext encrypted under one key... 
Analytical models | standard model | Public key | Receivers | Games | Asymmetric cryptography | Encryption | proxy re-encryption | chosen-ciphertext security | unidirectionality | PROOFS | DELEGATION | COMPUTER SCIENCE, INFORMATION SYSTEMS | IDENTITY-BASED ENCRYPTION | ENGINEERING, ELECTRICAL & ELECTRONIC | Cryptography | Ciphers | Research | Bulging | Expenses | Keys | Security | Proxy client servers | Translations | Standards | Cryptography and Security | Computer Science
Journal Article
The Computer Journal, ISSN 0010-4620, 04/2019, Volume 62, Issue 4, pp. 490 - 506
Abstract The traditional security notion of proxy re-encryption (PRE) focuses on preventing the proxy learning anything about the encrypted messages... 
COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | non-transferability | COMPUTER SCIENCE, INFORMATION SYSTEMS | indistinguishability obfuscation | COMPUTER SCIENCE, THEORY & METHODS | proxy re-encryption
Journal Article
Information Sciences, ISSN 0020-0255, 02/2014, Volume 258, pp. 355 - 370
...) and proxy re-encryption (PRE) to delegate the cloud service provider (CSP) to execute re-encryption... 
Cloud computing | Attribute-based encryption | Time | Proxy re-encryption | COMPUTER SCIENCE, INFORMATION SYSTEMS | Access control | Proxy | Data security
Journal Article
Pervasive and Mobile Computing, ISSN 1574-1192, 06/2016, Volume 28, pp. 122 - 134
Journal Article
PLoS ONE, ISSN 1932-6203, 12/2014, Volume 9, Issue 12, p. e116325
.... In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS... 
MULTIDISCIPLINARY SCIENCES | User-Computer Interface | Algorithms | Information Storage and Retrieval - methods | Humans | Search Engine | Computer Security - legislation & jurisprudence | Internet | Cryptography | Proxy | Models | Access control | Privacy | Security management | Searching | Concrete construction | Virtual networks | Embedding | Encryption | Web site reviews | Security
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 03/2016, Volume 9543, pp. 363 - 378
Journal Article
2008, Lecture Notes in Computer Science, ISBN 354078439X, Volume 4939
Book Chapter
Security and Communication Networks, ISSN 1939-0114, 12/2015, Volume 8, Issue 18, pp. 3796 - 3803
Proxy re‐encryption (PRE) is a cryptographic primitive that allows a proxy to turn an Alice's ciphertext into a Bob's ciphertext on the same plaintext... 
CPA secure | lattice cryptography | LWE | proxy re‐encryption | Lattice cryptography | Proxy re-encryption | COMPUTER SCIENCE, INFORMATION SYSTEMS | proxy re-encryption | TELECOMMUNICATIONS | Cryptography | Proxy | Algorithms | Encryption | Lattices | Learning | Errors | Construction | Security | Communication networks | Factorization
Journal Article
Concurrency and Computation: Practice and Experience, ISSN 1532-0626, 10/2017, Volume 29, Issue 19, pp. e4211 - n/a
Journal Article
Security and Communication Networks, ISSN 1939-0114, 09/2016, Volume 9, Issue 14, pp. 2397 - 2411
.... In this paper, we tackle the aforementioned challenge for the first time by formalizing the notion of anonymous ciphertext‐policy attribute‐based proxy re‐encryption (anonymous CP‐ABPRE... 
access control | anonymity | cloud computing | attribute‐based proxy re‐encryption | access policy update | attribute-based proxy re-encryption | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Access control | Cloud computing | Proxy | Privacy | Policies | Computer simulation | Computer information security | Communication networks | Cryptography
Journal Article
ACM Transactions on Information and System Security (TISSEC), ISSN 1094-9224, 02/2006, Volume 9, Issue 1, pp. 1 - 30
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-encryption , in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext... 
bilinear maps | key translation | double decryption | Proxy re-encryption | Bilinear maps | Key translation | Double decryption
Journal Article
Concurrency and Computation: Practice and Experience, ISSN 1532-0626, 07/2017, Volume 29, Issue 14, p. n/a
.... The conditional proxy re‐encryption (CPRE) is a useful concept for secure group data sharing via cloud while preserving the privacy of the shared data from any unintended third parties including the cloud operator... 
outsourcing computation | cloud computing | mobile cloud | proxy re‐encryption | conditional proxy re‐encryption | conditional proxy re-encryption | proxy re-encryption | COMPUTER SCIENCE, SOFTWARE ENGINEERING | SCHEME | COMPUTER SCIENCE, THEORY & METHODS | Proxy | Analysis | Outsourcing | Cloud computing | Privacy | Electronic devices | Computer simulation | Information sharing | Data retrieval | Portable equipment | Encryption | Terminals | Clients
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 10/2014, Volume 9, Issue 10, pp. 1667 - 1680
Journal Article
Science China Information Sciences, ISSN 1674-733X, 5/2013, Volume 56, Issue 5, pp. 1 - 13
Weng et al. introduced the notion of conditional proxy re-encryption (C-PRE), whereby only the ciphertext satisfying one condition set by Alice can be re-encrypted by the proxy... 
Information Systems and Communication Service | proxy re-encryption | chosen-ciphertext security | fuzzy conditional proxy re-encryption | Computer Science | COMPUTER SCIENCE, INFORMATION SYSTEMS | ENGINEERING, ELECTRICAL & ELECTRONIC | Computer science | Proxy | Analysis | Fuzzy logic | Construction | China | Fuzzy set theory | Fuzzy | Security | Cryptography | Proxy client servers
Journal Article
Pervasive and Mobile Computing, ISSN 1574-1192, 06/2016, Volume 28, pp. 113 - 121
Bidirectional proxy re-encryption allows ciphertext transformation between Alice and Bob via a semi-trusted proxy, who however cannot obtain the corresponding plaintext... 
Cryptographic cloud storage | Replayable chosen-ciphertext attack | Multi-use | Bidirectional proxy re-encryption | Master secret security | Constant size | SCHEME | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Cloud computing | Proxy | Cryptography | Analysis
Journal Article
Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, 8/2018, Volume 9, Issue 4, pp. 1267 - 1273
Journal Article
International Journal of Communication Systems, ISSN 1074-5351, 07/2018, Volume 31, Issue 11, pp. e3571 - n/a
Summary With the fast progress of the Internet and communication technologies, the digital communication is increasingly based on the architecture of TCP/IP.... 
secure file transfer | Named Data Network | proxy re‐encryption | authentication | proxy re-encryption | TELECOMMUNICATIONS | IDENTITY-BASED ENCRYPTION | ENGINEERING, ELECTRICAL & ELECTRONIC | Data security | Data transfer (computers) | TCP (protocol) | Data encryption | Computer architecture | IP (Internet Protocol) | Encryption | Overloading | TCP/IP (protocol)
Journal Article