Time-and-ID-based proxy reencryption scheme
From MaRDI portal
Publication:2336347
DOI10.1155/2014/329198zbMath1442.94042OpenAlexW2158897804WikidataQ59050961 ScholiaQ59050961MaRDI QIDQ2336347
Kambombo Mtonga, Anand Paul, Seungmin Rho
Publication date: 19 November 2019
Published in: Journal of Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2014/329198
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Identity-Based Cryptosystems and Signature Schemes
- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks
- Fully Secure Unidirectional Identity-Based Proxy Re-encryption
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Identity-Based Proxy Re-encryption
- Conditional Proxy Broadcast Re-Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Proxy Re-encryption Systems for Identity-Based Encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Type-Based Proxy Re-encryption and Its Construction
This page was built for publication: Time-and-ID-based proxy reencryption scheme