Proxy re-encryption: Difference between revisions

Content deleted Content added
Abhi3385 (talk | contribs)
No edit summary
m Replacing {{expert}} with {{expert-subject}} for a section
Line 1:
{{Orphan|date=February 2009}}
{{Expert|date=February 2009}}
 
'''Proxy re-encryption''' schemes are [[cryptosystems]] which allow third-parties ([[proxy server|proxies]]) to alter a [[ciphertext]] which has been [[encryption|encrypted]] for one party, so that it may be decrypted by another.
 
==Examples of Use==
{{Expert-subject|Cryptography|section|date=June 2007}}
Bob could designate a proxy to re-encrypt one of his messages that is to be sent to Chris. This generates a new [[Key (cryptography)|key]] that Chris can use to decrypt the message. Now if Alice sends Chris a message that was encrypted under Bob's key, the proxy will alter the message, allowing Chris to decrypt it. This method allows for a number of applications such as [[e-mail forwarding]], law-enforcement monitoring, and content distribution.
 
Line 21:
 
==References==
{{reflist}}
* M. Blaze, G. Bleumer, M. Strauss. [http://link.springer.de/link/service/series/0558/bibs/1403/14030127.htm Divertible Protocols and Atomic Proxy Cryptography].
 
*Bertino, E., Sandhu, R. [http://ieeexplore.ieee.org/search/wrapper.jsp?arnumber=1416861 "Database security - concepts, approaches, and challenges."] <u>IEEE Transations on Dependable and Secure Computing</u> 2 (2005): 2-19
 
*G. Ateniese, K. Fu, M. Green, S. Hohenberger. [http://spar.isi.jhu.edu/~mgreen/proxy.pdf Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage]. Proceedings of the 12th Annual Network and Distributed Systems Security Symposium (NDSS 2005), San Diego, California, 2005.
 
*M. Green, G. Ateniese. [http://eprint.iacr.org/2006/473 Identity-Based Proxy Re-encryption]. Applied Cryptography and Network Security Conference, June 2007.
 
*S. Hohenberger, G. Rothblum, a. shelat, and V. Vaikuntanathan. Securely Obfuscating Re-encryption. Proceedings of the Theory of Cryptography Conference (TCC), 2007.
*[http://spar.isi.jhu.edu/~mgreen/prl/ The JHU-MIT Proxy Re-cryptography Library]
Line 34 ⟶ 31:
 
[[Category:Cryptography]]
 
 
{{crypto-stub}}