Efficient attribute-based proxy re-encryption with constant size ciphertexts
From MaRDI portal
Publication:2152056
DOI10.1007/978-3-030-65277-7_29zbMath1492.94157OpenAlexW3112448806MaRDI QIDQ2152056
C. Pandu Rangan, Arinjita Paul, S. Sharmila Deva Selvi
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-65277-7_29
Related Items (1)
Cites Work
- Unnamed Item
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Computational friendly attribute-based encryptions with short ciphertext
- Short signatures from the Weil pairing
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
- Secure integration of asymmetric and symmetric encryption schemes
- Efficient attribute-based proxy re-encryption with constant size ciphertexts
- What about Bob? The inadequacy of CPA security for proxy reencryption
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
- Fuzzy Identity-Based Encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
This page was built for publication: Efficient attribute-based proxy re-encryption with constant size ciphertexts