A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion (Q6163695): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-99807-7_36 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2891881881 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Lattice (H)IBE in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249633 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proxy Re-encryption from Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Proxy Re-encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Private Proxy Re-encryption under LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Proxy Re-encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRE: stronger security notions and efficient construction with non-interactive opening / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4829810 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228459 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Amortized Complexity of Zero-Knowledge Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved proxy re-encryption schemes with applications to secure distributed storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Private Proxy Re-encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer / rank
 
Normal rank
Property / cites work
 
Property / cites work: New bounds in some transference theorems in the geometry of numbers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Inequalities for convex bodies and polar reciprocal lattices in \(\mathbb{R}^ n\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) Fully Homomorphic Encryption without Bootstrapping / rank
 
Normal rank

Latest revision as of 14:06, 1 August 2024

scientific article; zbMATH DE number 7704793
Language Label Description Also known as
English
A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
scientific article; zbMATH DE number 7704793

    Statements

    A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    30 June 2023
    0 references
    learning with errors (LWE)
    0 references
    decryption rights
    0 references
    ciphertext
    0 references
    resist collusion attacks
    0 references
    adversary asks
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers