Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography)

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lattice Based Identity Based Proxy Re-Encryption Scheme

At Eurocrypt 1998, Blaze, Bleumer and Strauss (BBS) presented a new primitive called proxy reencryption. This new primitive allows semi trusted proxy to convert a ciphertext for Alice into a ciphertext for Bob without underlying message. Till now all the identity based proxy re-encryption schemes are based on the number theoretic assumptions like prime factorization, discrete logarithm problem ...

متن کامل

Securing Healthcare Records Using Proxy Re-Encryption Scheme in Cloud

The advent of semi-conductors emerged day to day and lead us to the current trend of Cloud computing, which brings the information required to our life at our finger tips. The technology of today is getting expanded every day, especially in the management of EHR’s. In order to provide high security for health care data we need a strong security mechanism for EHR, Proxy re-encryption schemes are...

متن کامل

A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing

Cloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources. The cloud storage system consists of a collection of storage servers and key servers. Storing data in a third party cloud system causes serious concern on data confidentiality, so a user divides the data into blocks, encrypts and stores them in various storage servers. The stora...

متن کامل

A Secure Cloud server System using Proxy Re-Encryption Model

A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Cons...

متن کامل

Identity-Based Proxy Re-encryption

In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with curr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2019

ISSN: 2502-4760,2502-4752

DOI: 10.11591/ijeecs.v16.i3.pp1455-1463