Please use this identifier to cite or link to this item:
http://ir.mu.ac.ke:8080/jspui/handle/123456789/6063
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Milgo, Edna | - |
dc.date.accessioned | 2022-03-08T07:43:30Z | - |
dc.date.available | 2022-03-08T07:43:30Z | - |
dc.date.issued | 2009 | - |
dc.identifier.uri | https://doi.org/10.1145/1566445.1566478 | - |
dc.identifier.uri | http://ir.mu.ac.ke:8080/jspui/handle/123456789/6063 | - |
dc.description.abstract | Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol should be key independent to avoid compromising the private keys of the sender and the recipient. PRE should also be secure from signature re-usability, where unreliable proxies store and re-use the signatures without the authorization of the signature bearer. This is achieved by ensuring that PRE algorithm is unidirectional, key independent and the signature is dynamic. The proposed approach uses identity and secret key to prevent plain text and collusion attacks while ensuring that the delegator approves every signature used on his behalf. The algorithm used to generate the private/public keys is different from that generating the secret key. The proposed approach is secure even in unreliable proxies. | en_US |
dc.language.iso | en | en_US |
dc.publisher | ACM Digital Library | en_US |
dc.subject | Cryptosystems | en_US |
dc.subject | Ciphertexts | en_US |
dc.subject | Cipher attacks | en_US |
dc.subject | Proxy re-encryption | en_US |
dc.title | A secure unidirectional proxy re-encryption using identity and secret key exchange | en_US |
dc.type | Article | en_US |
Appears in Collections: | School of Information Sciences |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.