PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q115036543, #quickstatements; #temporary_batch_1707252663060
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.tcs.2014.04.028 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2051193066 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved proxy re-encryption schemes with applications to secure distributed storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Private Proxy Re-encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: The complexity of certain multi-exponentiation techniques in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249633 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short signatures without random oracles and the SDH assumption in bilinear groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Discrete logarithm problems with auxiliary inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Unidirectional Proxy Re-Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-interactive Proofs for Integer Multiplication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption with Non-interactive Opening / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343437 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Proxy Re-encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Realizing Hash-and-Sign Signatures under Standard Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4263425 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343435 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318689 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: CCA-Secure Proxy Re-encryption without Pairings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Type-Based Proxy Re-encryption and Its Construction / rank
 
Normal rank

Latest revision as of 15:22, 8 July 2024

scientific article
Language Label Description Also known as
English
PRE: stronger security notions and efficient construction with non-interactive opening
scientific article

    Statements

    PRE: stronger security notions and efficient construction with non-interactive opening (English)
    0 references
    0 references
    0 references
    0 references
    23 June 2014
    0 references
    public key encryption
    0 references
    proxy re-encryption
    0 references
    chosen key model
    0 references
    knowledge of secret key model
    0 references
    chosen-ciphertext security
    0 references
    DBDH
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers