PRE: stronger security notions and efficient construction with non-interactive opening
From MaRDI portal
Publication:2015128
Recommendations
- Proxy re-encryption in a stronger security model extended from CT-RSA2012
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Key-Private Proxy Re-encryption
- A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
Cites work
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- scientific article; zbMATH DE number 1341870 (Why is no real title available?)
- scientific article; zbMATH DE number 708801 (Why is no real title available?)
- scientific article; zbMATH DE number 1030992 (Why is no real title available?)
- scientific article; zbMATH DE number 1030994 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- CCA-Secure Proxy Re-encryption without Pairings
- Discrete logarithm problems with auxiliary inputs
- Efficient Unidirectional Proxy Re-Encryption
- Fully homomorphic encryption using ideal lattices
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Identity-Based Proxy Re-encryption
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Key-Private Proxy Re-encryption
- Non-interactive Proofs for Integer Multiplication
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
- Public-Key Encryption with Non-interactive Opening
- Public-key encryption with non-interactive opening: new constructions and stronger definitions
- Realizing Hash-and-Sign Signatures under Standard Assumptions
- Short signatures without random oracles and the SDH assumption in bilinear groups
- The complexity of certain multi-exponentiation techniques in cryptography
- Topics in Cryptology – CT-RSA 2005
- Type-Based Proxy Re-encryption and Its Construction
- Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
Cited in
(2)
This page was built for publication: PRE: stronger security notions and efficient construction with non-interactive opening
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2015128)