A CCA-secure collusion-resistant identity-based proxy re-encryption scheme
From MaRDI portal
Publication:1616645
DOI10.1007/978-3-030-01446-9_7zbMATH Open1421.94065OpenAlexW2895749865MaRDI QIDQ1616645FDOQ1616645
Authors: Arinjita Paul, Varshika Srinivasavaradhan, S. Selvi, C. Pandu Rangan
Publication date: 7 November 2018
Full work available at URL: https://doi.org/10.1007/978-3-030-01446-9_7
Recommendations
- Efficient attribute-based proxy re-encryption with constant size ciphertexts
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- A dynamic type and identity-based proxy re-encryption scheme
- Proxy re-encryption with unforgeable re-encryption keys
Cited In (10)
- A dynamic type and identity-based proxy re-encryption scheme
- Identity-based proxy re-encryption based on SM9
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- Efficient attribute-based proxy re-encryption with constant size ciphertexts
- Identity-based data storage scheme with anonymous key generation in fog computing
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
- A secure cloud data sharing scheme from identity-based proxy re-encryption
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions
- New identity-based proxy re-encryption schemes to prevent collusion attacks
This page was built for publication: A CCA-secure collusion-resistant identity-based proxy re-encryption scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1616645)