EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
From MaRDI portal
Publication:2509596
Recommendations
- A secure cloud data sharing scheme from identity-based proxy re-encryption
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
- Flexible attribute-based proxy re-encryption for efficient data sharing
- A dynamic type and identity-based proxy re-encryption scheme
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
Cites work
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- CCA proxy re-encryption without bilinear maps in the standard model
- CCA-Secure Proxy Re-encryption without Pairings
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Conditional Proxy Broadcast Re-Encryption
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Key-Private Proxy Re-encryption
- Securely Obfuscating Re-encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
Cited in
(1)
This page was built for publication: EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2509596)