-
Notifications
You must be signed in to change notification settings - Fork 4
Home
Welcome to the recrypt wiki!
Herein you can find more details about the proxy re-encryption algorithms that the Recrypt library implements, and information on the work we have done to ensure that the algorithms and the implementation are secure.
We have two internal documents that we generated to guide our implementation and explain it: the first describes the algorithms and our tweaks to them (orig_algo.pdf), while the second contains more detail about our implementation choices (icl_impl.pdf). A newer, more complete description of the algorithm and its use in an access control system is available in the paper "Cryptographically Enforced Orthogonal Access Control at Scale" by B. Wall and P. Walsh, presented at the 2018 6th International Workshop on Security in Cloud Computing, which was held during the 2018 ACM AsiaCCS conference. The paper is available for download here.