Proxy re-encryption from lattices
From MaRDI portal
Recommendations
Cited in
(15)- Unidirectional updatable encryption and proxy re-encryption from DDH
- A homomorphic proxy re-encryption from lattices
- Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
- CCA-1 secure updatable encryption with adaptive security
- Fine-grained proxy re-encryption: definitions and constructions from LWE
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting
- Proxy re-encryption and re-signatures from lattices
- Lattice-based dual receiver encryption and more
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
- Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
- Collusion resistant identity based proxy re-encryption scheme on lattices
- Key-private proxy re-encryption under LWE
- Cryptanalysis of an NTRU-based proxy encryption scheme from ASIACCS'15
This page was built for publication: Proxy re-encryption from lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402965)