2018
DOI: 10.1007/978-3-030-05366-6_29
|View full text |Cite
|
Sign up to set email alerts
|

RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(15 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…Proxies can be malicious and perform wormhole attacks. The existing threshold proxy re-encryption schemes [10], [20], [21], [22] do not satisfy some of the desirable properties of PRE scheme like collusion safety, non-transitive, non-interactive, and unidirectionality. In existing schemes, if any proxy wants to leave or join the quorum then these schemes cannot update the quorum by sharing new shares without changing the secret.…”
Section: Problem Descriptionmentioning
confidence: 99%
See 4 more Smart Citations
“…Proxies can be malicious and perform wormhole attacks. The existing threshold proxy re-encryption schemes [10], [20], [21], [22] do not satisfy some of the desirable properties of PRE scheme like collusion safety, non-transitive, non-interactive, and unidirectionality. In existing schemes, if any proxy wants to leave or join the quorum then these schemes cannot update the quorum by sharing new shares without changing the secret.…”
Section: Problem Descriptionmentioning
confidence: 99%
“…We analyze and compare the PB-TPRE scheme with existing TPRE schemes [10], [15], [20], [21], [22] based on enumerated properties of PRE scheme, semantic (IND-CPA) security, parallel computation, verifiability of final re-encrypted ciphertext, and proactive nature. PB-TPRE scheme helps transform the outsourced encrypted data of the data owner into a re-encrypted ciphertext for the user after performing t partial re-encryption concurrently afterward combines them without regulating the proxies in any sequence.…”
Section: Theoretical Analysis and Comparisonmentioning
confidence: 99%
See 3 more Smart Citations