Tracing Malicious Proxies in Proxy Re-encryption (Q3600514): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1755945123 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption Gone Wild / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Traitor Tracing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved proxy re-encryption schemes with applications to secure distributed storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pairing-Friendly Elliptic Curves of Prime Order / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249633 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Identity Based Encryption with Constant Size Ciphertext / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343416 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compact E-Cash / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940701 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Proxy Re-encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing Trust in the PKG in Identity Based Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Securely Obfuscating Re-encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: About the Security of MTI/C0 and MQV / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proxy Re-encryption Systems for Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal probabilistic fingerprint codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 02:02, 29 June 2024

scientific article
Language Label Description Also known as
English
Tracing Malicious Proxies in Proxy Re-encryption
scientific article

    Statements

    Tracing Malicious Proxies in Proxy Re-encryption (English)
    0 references
    0 references
    0 references
    10 February 2009
    0 references
    0 references
    unidirectional proxy re-encryption
    0 references
    transferability issues
    0 references
    collusion detection and traceability
    0 references
    0 references