Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
From MaRDI portal
Recommendations
- Fully secure unidirectional identity-based proxy re-encryption
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Conditional Proxy Broadcast Re-Encryption
- Anonymous conditional proxy re-encryption without random oracle
Cites work
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- Advances in Cryptology - CRYPTO 2003
- Anonymous conditional proxy re-encryption without random oracle
- CCA proxy re-encryption without bilinear maps in the standard model
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Efficient Identity-Based Encryption Without Random Oracles
- Factoring-based proxy re-encryption schemes
- Fully secure unidirectional identity-based proxy re-encryption
- Fuzzy Identity-Based Encryption
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Encryption from the Weil Pairing
- Identity-Based Proxy Re-encryption
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Inter-domain Identity-Based Proxy Re-encryption
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- On the security of a bidirectional proxy re-encryption scheme from PKC 2010
- Proxy Re-encryption Systems for Identity-Based Encryption
- Proxy re-encryption in a stronger security model extended from CT-RSA2012
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- Type-Based Proxy Re-encryption and Its Construction
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
Cited in
(10)- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
- Attribute-based conditional proxy re-encryption in the standard model under LWE
- Extensions of IBE and related primitives
- HRA-secure attribute-based threshold proxy re-encryption from lattices
- On the security of two identity-based conditional proxy re-encryption schemes
- Quantum-resistant identity-based signature with message recovery and proxy delegation
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
This page was built for publication: Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2453123)