2020
DOI: 10.1038/s41598-020-65738-y
|View full text |Cite
|
Sign up to set email alerts
|

A Quantum secure sharing protocol for Cloud data based on proxy re-encryption

Abstract: A quantum scheme for cloud data sharing based on proxy re-encryption is proposed. the user Alice stores the cipher-text of her data on cloud data center. When Alice wants to share her data with another user Bob, Alice is called the delegator and Bob is called the delegatee. the cloud service provider (called the proxy) can convert the delegator's cipher-text into the delegatee's cipher-text without decrypting the former, so that the delegatee can get the plain-text of Alice's data with his private key. the pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…Proxy re-encryption is based on adding a proxy to the conventional cryptographic system. The proxy converts the cipher text of the source user into the cipher text of the destination user without obtaining the plain text of the source user [20]. Most of PRE schemes used asymmetric cryptography for encryption/decryption.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Proxy re-encryption is based on adding a proxy to the conventional cryptographic system. The proxy converts the cipher text of the source user into the cipher text of the destination user without obtaining the plain text of the source user [20]. Most of PRE schemes used asymmetric cryptography for encryption/decryption.…”
Section: Introductionmentioning
confidence: 99%
“…To improve the performance, the security operations can be offloaded to the fog nodes [17]. Proxy re-encryption is an effective cryptographic technique in cloud computing [19,20] and hence it can be used in fog computing where, in this case, the fog nodes can be treated as proxy nodes [18]. Proxy re-encryption is based on adding a proxy to the conventional cryptographic system.…”
Section: Introductionmentioning
confidence: 99%