Multi-use and unidirectional identity-based proxy re-encryption schemes
From MaRDI portal
Publication:2638201
DOI10.1016/J.INS.2010.06.029zbMATH Open1194.94194OpenAlexW2139972841WikidataQ122740931 ScholiaQ122740931MaRDI QIDQ2638201FDOQ2638201
Authors: Hong Bing Wang, Zhenfu Cao, Licheng Wang
Publication date: 15 September 2010
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.06.029
Recommendations
Cites Work
- A secure identity-based proxy multi-signature scheme
- Short signatures from the Weil pairing
- The exact security of digital signatures -- how to sign with RSA and Rabin
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Nonmalleable Cryptography
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Identity-Based Proxy Re-encryption
- Title not available (Why is that?)
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- CCA-Secure Proxy Re-encryption without Pairings
- Key-Private Proxy Re-encryption
- Proxy re-encryption with keyword search
- How to construct secure proxy cryptosystem
- A comparison of MNT curves and supersingular curves
- Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (19)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- RCCA-secure multi-use bidirectional proxy re-encryption with master secret security
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Identity-Based Proxy Re-encryption Without Random Oracles
- Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
- Identity-Based Proxy Re-encryption
- Inter-domain Identity-Based Proxy Re-encryption
- Attribute-based conditional proxy re-encryption in the standard model under LWE
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Secure server-aided data sharing clique with attestation
- Identity-based proxy re-encryption with threshold multi-proxy
- On the security of two identity-based conditional proxy re-encryption schemes
- Proxy Re-encryption Systems for Identity-Based Encryption
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Efficient Unidirectional Proxy Re-Encryption
- Fully secure unidirectional identity-based proxy re-encryption
This page was built for publication: Multi-use and unidirectional identity-based proxy re-encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2638201)