The document describes a secure cloud storage system that supports data forwarding without retrieving data. It uses a threshold proxy re-encryption scheme combined with a decentralized erasure code. This allows storage servers to directly re-encrypt and forward encrypted data to another user, without having the plaintext. The system has four phases: setup, storage, forwarding, and retrieval. It discusses parameters for the number of storage servers and key shares to provide security and robustness. The scheme supports encoding and forwarding of encrypted data in a distributed manner across independent servers.
Related topics: