Please use this identifier to cite or link to this item:
Full metadata record
|dc.identifier.citation||ACM International Conference Proceeding Series, 2016, Vol.04-05-March-2016, , pp.-||en_US|
|dc.description.abstract||Proxy re-encryption is a scheme where a semi-Trusted proxy alters the confidential message of one party into a confidential message of another party without knowing the original plaintext. To do the same, various approaches are suggested in the public key set up cryptography. In this paper, we propose two new methods named CTR1-PRE and CTR2-PRE for proxy re-encryption on public key setting which are based on elliptic curve. Since elliptic curve cryptosystem is becoming a new famous methodology due to its lot of nice features, it is required to construct a proxy re-encryption scheme which works on elliptic curve as well. So, in this work we have shown two such proxy re-encryption methods and we have also shown that one of our approach holds all the essential properties of proxy re-encryption method such as unidirectional, non-interactive, proxy invisibility, original access to ciphertext, key optimal for storage, collusion safe from intruders, etc. � 2016 ACM.||en_US|
|dc.title||Elliptic curve based proxy re-encryption||en_US|
|Appears in Collections:||2. Conference Papers|
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.