A CCA-secure collusion-resistant identity-based proxy re-encryption scheme
From MaRDI portal
Publication:1616645
Recommendations
- Efficient attribute-based proxy re-encryption with constant size ciphertexts
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- A dynamic type and identity-based proxy re-encryption scheme
- Proxy re-encryption with unforgeable re-encryption keys
Cited in
(10)- New identity-based proxy re-encryption schemes to prevent collusion attacks
- A dynamic type and identity-based proxy re-encryption scheme
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- Efficient attribute-based proxy re-encryption with constant size ciphertexts
- Identity-based data storage scheme with anonymous key generation in fog computing
- Identity-based proxy re-encryption based on SM9
- A secure cloud data sharing scheme from identity-based proxy re-encryption
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions
This page was built for publication: A CCA-secure collusion-resistant identity-based proxy re-encryption scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1616645)