Key-private proxy re-encryption under LWE
From MaRDI portal
Publication:2872038
DOI10.1007/978-3-319-03515-4_1zbMATH Open1288.94051OpenAlexW1620415689MaRDI QIDQ2872038FDOQ2872038
Authors: Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Li-hua Wang
Publication date: 14 January 2014
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-03515-4_1
Recommendations
Cited In (14)
- An LWE-based key transfer protocol with anonymity
- Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting
- On the asymptotic complexity of solving LWE
- A homomorphic proxy re-encryption from lattices
- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
- Polynomial-time key-recovery attacks against \texttt{NTRUReEncrypt} from ASIACCS'15
- Proxy re-encryption from lattices
- Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- Attribute-based conditional proxy re-encryption in the standard model under LWE
- An efficient key recovery attack against NTRUReEncrypt from AsiaCCS 2015
- The direction of updatable encryption does matter
- Universal proxy re-encryption
- OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges
This page was built for publication: Key-private proxy re-encryption under LWE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2872038)