Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
From MaRDI portal
Publication:2453123
DOI10.1016/j.tcs.2014.04.027zbMath1358.94069OpenAlexW1987493859WikidataQ121754503 ScholiaQ121754503MaRDI QIDQ2453123
Kaitai Liang, Jianying Zhou, Xiao Tan, Duncan S. Wong, Cheng-Kang Chu, Chun-Ming Tang
Publication date: 6 June 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.04.027
bilinear mapchosen-ciphertext securityconditional proxy re-encryptionidentity-based proxy re-encryptionconstant size ciphertext
Related Items (7)
Extensions of IBE and Related Primitives ⋮ Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing ⋮ Attribute-based conditional proxy re-encryption in the standard model under LWE ⋮ On the security of two identity-based conditional proxy re-encryption schemes ⋮ HRA-secure attribute-based threshold proxy re-encryption from lattices ⋮ Identity-based key-exposure resilient cloud storage public auditing scheme from lattices ⋮ Quantum-resistant identity-based signature with message recovery and proxy delegation
Cites Work
- Unnamed Item
- Unnamed Item
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Factoring-Based Proxy Re-Encryption Schemes
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks
- On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010
- Fully Secure Unidirectional Identity-Based Proxy Re-encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model
- Identity-Based Proxy Re-encryption
- Inter-domain Identity-Based Proxy Re-encryption
- Anonymous Conditional Proxy Re-encryption without Random Oracle
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identity-Based Encryption from the Weil Pairing
- Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012
- A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Advances in Cryptology - CRYPTO 2003
- Proxy Re-encryption Systems for Identity-Based Encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Type-Based Proxy Re-encryption and Its Construction
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
This page was built for publication: Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts