A CCA-secure collusion-resistant identity-based proxy re-encryption scheme
From MaRDI portal
Publication:1616645
DOI10.1007/978-3-030-01446-9_7zbMATH Open1421.94065OpenAlexW2895749865MaRDI QIDQ1616645FDOQ1616645
Authors: Arinjita Paul, Varshika Srinivasavaradhan, S. Selvi, C. Pandu Rangan
Publication date: 7 November 2018
Full work available at URL: https://doi.org/10.1007/978-3-030-01446-9_7
Recommendations
- Efficient attribute-based proxy re-encryption with constant size ciphertexts
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- A dynamic type and identity-based proxy re-encryption scheme
- Proxy re-encryption with unforgeable re-encryption keys
Cited In (5)
- Identity-based proxy re-encryption based on SM9
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions
- New identity-based proxy re-encryption schemes to prevent collusion attacks
This page was built for publication: A CCA-secure collusion-resistant identity-based proxy re-encryption scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1616645)