Pages that link to "Item:Q5445463"
From MaRDI portal
The following pages link to Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption (Q5445463):
Displayed 44 items.
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- On the security of two identity-based conditional proxy re-encryption schemes (Q338380) (← links)
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles (Q387810) (← links)
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings (Q621615) (← links)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search (Q690450) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Proxy re-encryption with keyword search (Q985079) (← links)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (Q1791671) (← links)
- Threshold proxy re-signature (Q1937783) (← links)
- Re-encryption method designed by row complete matrix (Q1954746) (← links)
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems (Q1998999) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model (Q2031043) (← links)
- Universal proxy re-encryption (Q2061932) (← links)
- Efficient attribute-based proxy re-encryption with constant size ciphertexts (Q2152056) (← links)
- Time-and-ID-based proxy reencryption scheme (Q2336347) (← links)
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts (Q2453123) (← links)
- EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption (Q2509596) (← links)
- Identity-based proxy re-signatures from lattices (Q2512816) (← links)
- LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication (Q2630799) (← links)
- Multi-use and unidirectional identity-based proxy re-encryption schemes (Q2638201) (← links)
- Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption (Q2790055) (← links)
- Proxy Re-encryption with Delegatable Verifiability (Q2817808) (← links)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption (Q2890017) (← links)
- Augmented Learning with Errors: The Untapped Potential of the Error Term (Q2948191) (← links)
- Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption (Q3098009) (← links)
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security (Q3399207) (← links)
- Improved proxy re-encryption schemes with applications to secure distributed storage (Q3546459) (← links)
- Tracing Malicious Proxies in Proxy Re-encryption (Q3600514) (← links)
- Key-Private Proxy Re-encryption (Q3623052) (← links)
- Conditional Proxy Broadcast Re-Encryption (Q3634503) (← links)
- Public Verifiability from Pairings in Secret Sharing Schemes (Q3644208) (← links)
- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures (Q4916021) (← links)
- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication (Q4933222) (← links)
- Identity-based re-encryption scheme with lightweight re-encryption key generation (Q5031868) (← links)
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles (Q5046387) (← links)
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing (Q5056013) (← links)
- Compact hierarchical identity-based encryption based on a harder decisional problem (Q5259051) (← links)
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings (Q5502747) (← links)
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation (Q5919024) (← links)
- Multi-key Homomorphic Proxy Re-Encryption (Q6108846) (← links)
- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion (Q6163695) (← links)
- HRA-secure attribute-based threshold proxy re-encryption from lattices (Q6192306) (← links)