Bibliography on Proxy Re-Cryptography

maintained by Jun Shao (chn.junshao at gmail.com) last update: 2013-07-01 ( 8 papers added)

At Eurocrypt 1998, Blaze et al. proposed the concept of Proxy Re-Cryptography (PRC), which includes two parts: proxy re-encryption (PRE) and proxy re-signature (PRS). In proxy re-encryption, a semi-trusted proxy with specific information (a.k.a. re-encryption key) can translate a ciphertext for Alice (delegator) to another ciphertext of the same plaintext for Bob (delegatee), but the proxy cannot access the plaintext. In proxy re-signature, a semi-trusted proxy with specific information (a.k.a. re-signature key) can translate a signture of Alice (delegatee) into another signature of the same message of Bob (delegator), but the proxy cannot generate any signature on behalf of Alice or Bob. Due to the specific translation property, PRC can be used in many applications, such as forwarding encrypted email, distributed file system. Recently, PRC has become a hot topic in the field of applied cryptography.

There is already a proxy re-cryptography library on the WWW (http://spar.isi.jhu.edu/~mgreen/prl/), however, it is an incomplete list. Hence, I felt it would be useful to create a more complete bibliography on PRC.

In general, I am including papers that are published in conference proceedings and journals (but not unpublished technical reports, preprints or dissertations). The list has three parts: proxy re-encryption, proxy re-signature, and applications of proxy re-cryptography. I would appreciate knowing of any errors in this list, as well as any papers that should be added, update to unpublished papers, etc. Please e-mail me.


Proxy Re-Encryption (2 new) back

2013

2012

2011

2010

2009

2008

2007

2000-2006

1998-1999

Proxy Re-Signature (0 new) back

1998-Now

Applications of PRC(6 new) back

2013

2012

2011

2010

2009

2008

2007

2006

2005

2000-2004