Table of Content

Open Access iconOpen Access

ARTICLE

crossmark

The Development of Proxy Re-Encryption

Yepeng Liu1, 2, Yongjun Ren1, 2, *, Qirun Wang3, Jinyue Xia4

1 School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, 210044, China.
2 Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology, Nanjing University of Information Science & Technology, Nanjing, China.
3 School of Engineering and Technology, University of Hertfordshire, Hertford, UK.
4 International Business Machines Corporation (IBM), New York, USA.

* Corresponding Author: Yongjun Ren. Email: email

Journal of Cyber Security 2020, 2(1), 1-8. https://doi.org/10.32604/jcs.2020.05878

Abstract

With the diversification of electronic devices, cloud-based services have become the link between different devices. As a cryptosystem with secure conversion function, proxy re-encryption enables secure sharing of data in a cloud environment. Proxy re-encryption is a public key encryption system with ciphertext security conversion function. A semi-trusted agent plays the role of ciphertext conversion, which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key. Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al. [Blaze, Bleumer and Strauss (1998)]. After 20 years of development, proxy re-encryption has evolved into many forms been widely used. This paper elaborates on the definition, characteristics and development status of proxy re-encryption, and classifies proxy re-encryption from the perspectives of user identity, conversion condition, conversion hop count and conversion direction. The aspects of the existing program were compared and briefly reviewed from the aspects of features, performance, and security. Finally, this paper looks forward to the possible development direction of proxy reencryption in the future.

Keywords


Cite This Article

APA Style
Liu, Y., Ren, Y., Wang, Q., Xia, J. (2020). The development of proxy re-encryption. Journal of Cyber Security, 2(1), 1-8. https://doi.org/10.32604/jcs.2020.05878
Vancouver Style
Liu Y, Ren Y, Wang Q, Xia J. The development of proxy re-encryption. J Cyber Secur . 2020;2(1):1-8 https://doi.org/10.32604/jcs.2020.05878
IEEE Style
Y. Liu, Y. Ren, Q. Wang, and J. Xia, “The Development of Proxy Re-Encryption,” J. Cyber Secur. , vol. 2, no. 1, pp. 1-8, 2020. https://doi.org/10.32604/jcs.2020.05878



cc Copyright © 2020 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 3421

    View

  • 2258

    Download

  • 1

    Like

Related articles

Share Link