Adaptively secure proxy re-encryption
From MaRDI portal
Publication:2289435
DOI10.1007/978-3-030-17259-6_11OpenAlexW2810569776MaRDI QIDQ2289435FDOQ2289435
Authors: Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Publication date: 28 January 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-17259-6_11
Recommendations
- Key-Private Proxy Re-encryption
- Strong post-compromise secure proxy re-encryption
- A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model
- Proxy re-encryption in a stronger security model extended from CT-RSA2012
- PRE: stronger security notions and efficient construction with non-interactive opening
Cited In (12)
- (Inner-product) functional encryption with updatable ciphertexts
- Unidirectional updatable encryption and proxy re-encryption from DDH
- Conditional Proxy Broadcast Re-Encryption
- Fine-grained proxy re-encryption: definitions and constructions from LWE
- Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
- Multi-hop fine-grained proxy re-encryption
- Universal proxy re-encryption
- What about Bob? The inadequacy of CPA security for proxy reencryption
- Combined Proxy Re-encryption
- Tracing Malicious Proxies in Proxy Re-encryption
- The cost of adaptivity in security games on graphs
- Fuzzy conditional proxy re-encryption
This page was built for publication: Adaptively secure proxy re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2289435)