@Article{jcs.2020.05878, AUTHOR = {Yepeng Liu, Yongjun Ren, *, Qirun Wang, Jinyue Xia}, TITLE = {The Development of Proxy Re-Encryption}, JOURNAL = {Journal of Cyber Security}, VOLUME = {2}, YEAR = {2020}, NUMBER = {1}, PAGES = {1--8}, URL = {http://www.techscience.com/JCS/v2n1/39368}, ISSN = {2579-0064}, ABSTRACT = {With the diversification of electronic devices, cloud-based services have become the link between different devices. As a cryptosystem with secure conversion function, proxy re-encryption enables secure sharing of data in a cloud environment. Proxy re-encryption is a public key encryption system with ciphertext security conversion function. A semi-trusted agent plays the role of ciphertext conversion, which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key. Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al. [Blaze, Bleumer and Strauss (1998)]. After 20 years of development, proxy re-encryption has evolved into many forms been widely used. This paper elaborates on the definition, characteristics and development status of proxy re-encryption, and classifies proxy re-encryption from the perspectives of user identity, conversion condition, conversion hop count and conversion direction. The aspects of the existing program were compared and briefly reviewed from the aspects of features, performance, and security. Finally, this paper looks forward to the possible development direction of proxy reencryption in the future.}, DOI = {10.32604/jcs.2020.05878} }