Attribute-based conditional proxy re-encryption in the standard model under LWE
From MaRDI portal
Publication:2148755
DOI10.1007/978-3-030-88428-4_8zbMATH Open1498.68054OpenAlexW3202403659MaRDI QIDQ2148755FDOQ2148755
Authors: Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu
Publication date: 24 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88428-4_8
Recommendations
- Attribute-based proxy re-encryption from standard lattices
- A novel lattice-based ciphertext-policy attribute-based proxy re-encryption for cloud sharing
- Revocable attribute-based proxy re-encryption
- Key-private proxy re-encryption under LWE
- Fine-grained conditional proxy re-encryption and application
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computer security (68M25)
Cites Work
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Public-key cryptosystems from the worst-case shortest vector problem
- Trapdoors for hard lattices and new cryptographic constructions
- Bonsai trees, or how to delegate a lattice basis
- Efficient lattice (H)IBE in the standard model
- Classical hardness of learning with errors
- Better key sizes (and attacks) for LWE-based encryption
- Generating shorter bases for hard random lattices
- On lattices, learning with errors, random linear codes, and cryptography
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Identity-Based Proxy Re-encryption
- Title not available (Why is that?)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Advances in Cryptology - CRYPTO 2003
- Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
- Key-private proxy re-encryption under LWE
- Attribute-based proxy re-encryption from standard lattices
- Fine-grained conditional proxy re-encryption and application
- Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
- Fuzzy conditional proxy re-encryption
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
Cited In (10)
- Deniable Attribute Based Encryption for Branching Programs from LWE
- Fine-grained proxy re-encryption: definitions and constructions from LWE
- Fine-grained conditional proxy re-encryption and application
- Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
- HRA-secure attribute-based threshold proxy re-encryption from lattices
- \(\mathrm{mR}_{\mathrm{LWE}}\)-CP-ABE: a revocable CP-ABE for post-quantum cryptography
- Attribute-based proxy re-encryption from standard lattices
- Revocable attribute-based proxy re-encryption
- A novel lattice-based ciphertext-policy attribute-based proxy re-encryption for cloud sharing
- Key-private proxy re-encryption under LWE
This page was built for publication: Attribute-based conditional proxy re-encryption in the standard model under LWE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2148755)