Multi-security-level cloud storage system based on improved proxy re-encryption

J Shen, X Deng, Z Xu - EURASIP Journal on Wireless Communications …, 2019 - Springer
security requirements of the cloud environment, we present a scheme for a multi-security-level
cloud storage … and an improved identity-based proxy re-encryption (PRE) algorithm. Our …

Proxy re-encryption scheme for decentralized storage networks

J Kan, J Zhang, D Liu, X Huang - Applied Sciences, 2022 - mdpi.com
… talk about preliminary knowledge for the decentralized storage network and proxy re-encryption. …
The feature of skipping the re-encryption makes it fit better for the embedded device. …

Improved functional proxy re-encryption schemes for secure cloud data sharing

XA Wang, X Yang, C Li, Y Liu, Y Ding - Computer Science and …, 2018 - doiserbia.nb.rs
… very important applications for secure cloud storage and its … to achieve secure functional
proxy re-encryption scheme for cloud … based conditional proxy re-encryption scheme and the …

A secure erasure cloud storage system using advanced encryption standard algorithm and proxy re-encryption

R Nivedhaa, JJ Justus - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
… Cloud storage provides enhanced security from … storage framework that supports functionalities
is considered. We incorporate a novel proposal which is the proxy re-encryption scheme

A new kind of conditional proxy re-encryption for secure cloud storage

P Zeng, KKR Choo - IEEE Access, 2018 - ieeexplore.ieee.org
… in our big data-driven society, and to achieve secure cloud storage we need to enforce …
Improved proxy re-encryption schemes with applications to secure distributed storage. ACM …

A survey of proxy re-encryption for secure data sharing in cloud computing

Z Qin, H Xiong, S Wu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… survey of proxy re-encryption from different perspectives to offer a better understanding of …
One promising approach to protect the security of the data stored in cloud computing is to …

[PDF][PDF] A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption.

C Lan, H Li, S Yin, L Teng - Int. J. Netw. Secur., 2017 - Citeseer
… an encryption scheme combining identity proxy re-encryption based on … will improve this
encryption scheme and enhance its security to apply it into many actual encryption applications. …

Revisiting proxy re-encryption: forward secrecy, improved security, and applications

D Derler, S Krenn, T Lorünser, S Ramacher… - … workshop on public key …, 2018 - Springer
Proxy re-encryption is considered very useful in applications such as encrypted e-mail
forwarding or access control in secure … The secret key \(\mathsf {sk} _{\mathsf {HPKE}}\) is stored

A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system

Y Liu, Y Ren, C Ge, J Xia, Q Wang - … of Information Security and Applications, 2019 - Elsevier
… The multi-conditional proxy broadcast re-encryption scheme … condition judgment of the
proxy re-encryption system. … , the re-encryption key size of this scheme will increase linearly …

[PDF][PDF] Efficient identity-based proxy re-encryption scheme in blockchain-assisted decentralized storage system

J He, D Zheng, R Guo, Y Chen, K Li… - … of Network Security, 2021 - ijns.jalaxy.com.tw
… identity-based proxy re-encryption (IBPRE) scheme,data owner-… and the inter planetary file
system (IPFS) technology. The … other PRE schemes, our scheme has the better performance …