Keyword : proxy re-encryption


Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
Yanli CHEN Yuanyuan HU Minhui ZHU Geng YANG 
Publication:   
Publication Date: 2018/08/01
Vol. E101-B  No. 8 ; pp. 1798-1808
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
cloud computingattribute-based encryptionkeyword search delegationproxy re-encryption
 Summary | Full Text:PDF(1.6MB)

Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Yoshiaki SHIRAISHI Kenta NOMURA Masami MOHRI Takeru NARUSE Masakatu MORII 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10 ; pp. 2432-2439
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
cryptographic cloud storageciphertext-policy attribute-based encryptionsemantic securityattribute revocationproxy re-encryption
 Summary | Full Text:PDF(802.4KB)

Achieving Scalable and Optimized Attribute Revocation in Cloud Computing
Somchart FUGKEAW Hiroyuki SATO 
Publication:   
Publication Date: 2017/05/01
Vol. E100-D  No. 5 ; pp. 973-983
Type of Manuscript:  Special Section PAPER (Special Section on the Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
revocationdata access controlpolicy updateproxy re-encryption
 Summary | Full Text:PDF(1.5MB)

Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps
Fei TANG Hongda LI Jinyong CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/02/01
Vol. E98-A  No. 2 ; pp. 762-766
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
proxy re-encryptionmulti-hopmultilinear maps
 Summary | Full Text:PDF(91.9KB)

Key-Private Proxy Re-Encryption from Lattices, Revisited
Ryo NISHIMAKI Keita XAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 100-116
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
proxy re-encryptionkey privacyanonymitylattices
 Summary | Full Text:PDF(616.6KB)

Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
Lihua WANG Licheng WANG Masahiro MAMBO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 70-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
proxy decryptionproxy re-encryptionrevocabilityhierarchical confidentialities
 Summary | Full Text:PDF(901.5KB)

A Timed-Release Proxy Re-Encryption Scheme
Keita EMURA Atsuko MIYAJI Kazumasa OMOTE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/08/01
Vol. E94-A  No. 8 ; pp. 1682-1695
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
timed-release encryptionproxy re-encryption
 Summary | Full Text:PDF(397.7KB)

Secure and Efficient IBE-PKE Proxy Re-Encryption
Takeo MIZUNO Hiroshi DOI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 36-44
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
proxy re-encryptionpublic key encryptionidentity-based encryptionbilinear maps
 Summary | Full Text:PDF(385.4KB)