
@Article{jcs.2020.05878,
AUTHOR = {Yepeng Liu, Yongjun Ren, Qirun Wang, Jinyue Xia},
TITLE = {The Development of Proxy Re-Encryption},
JOURNAL = {Journal of Cyber Security},
VOLUME = {2},
YEAR = {2020},
NUMBER = {1},
PAGES = {1--8},
URL = {http://www.techscience.com/JCS/v2n1/39368},
ISSN = {2579-0064},
ABSTRACT = {With the diversification of electronic devices, cloud-based services have 
become the link between different devices. As a cryptosystem with secure conversion 
function, proxy re-encryption enables secure sharing of data in a cloud environment. 
Proxy re-encryption is a public key encryption system with ciphertext security conversion 
function. A semi-trusted agent plays the role of ciphertext conversion, which can convert 
the user ciphertext into the same plaintext encrypted by the principal’s public key. Proxy 
re-encryption has been a hotspot in the field of information security since it was proposed 
by Blaze et al. [Blaze, Bleumer and Strauss (1998)]. After 20 years of development, proxy 
re-encryption has evolved into many forms been widely used. This paper elaborates on 
the definition, characteristics and development status of proxy re-encryption, and 
classifies proxy re-encryption from the perspectives of user identity, conversion condition, 
conversion hop count and conversion direction. The aspects of the existing program were 
compared and briefly reviewed from the aspects of features, performance, and security. 
Finally, this paper looks forward to the possible development direction of proxy reencryption in the future.},
DOI = {10.32604/jcs.2020.05878}
}



