Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/8479
Full metadata record
DC FieldValueLanguage
dc.contributor.authorThangam, V.
dc.contributor.authorChandrasekaran, K.
dc.date.accessioned2020-03-30T10:18:48Z-
dc.date.available2020-03-30T10:18:48Z-
dc.date.issued2016
dc.identifier.citationACM International Conference Proceeding Series, 2016, Vol.04-05-March-2016, , pp.-en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/8479-
dc.description.abstractProxy re-encryption is a scheme where a semi-Trusted proxy alters the confidential message of one party into a confidential message of another party without knowing the original plaintext. To do the same, various approaches are suggested in the public key set up cryptography. In this paper, we propose two new methods named CTR1-PRE and CTR2-PRE for proxy re-encryption on public key setting which are based on elliptic curve. Since elliptic curve cryptosystem is becoming a new famous methodology due to its lot of nice features, it is required to construct a proxy re-encryption scheme which works on elliptic curve as well. So, in this work we have shown two such proxy re-encryption methods and we have also shown that one of our approach holds all the essential properties of proxy re-encryption method such as unidirectional, non-interactive, proxy invisibility, original access to ciphertext, key optimal for storage, collusion safe from intruders, etc. � 2016 ACM.en_US
dc.titleElliptic curve based proxy re-encryptionen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.