Key-private proxy re-encryption under LWE
From MaRDI portal
Publication:2872038
Recommendations
Cited in
(18)- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
- A homomorphic proxy re-encryption from lattices
- Universal proxy re-encryption
- The direction of updatable encryption does matter
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges
- Proxy re-encryption and re-signatures from lattices
- Polynomial-time key-recovery attacks against \texttt{NTRUReEncrypt} from ASIACCS'15
- Public key encryption with secure key leasing
- On the asymptotic complexity of solving LWE
- Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
- Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting
- Proxy re-encryption from lattices
- Attribute-based conditional proxy re-encryption in the standard model under LWE
- Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
- Attribute-based proxy re-encryption from standard lattices
- An LWE-based key transfer protocol with anonymity
- An efficient key recovery attack against NTRUReEncrypt from AsiaCCS 2015
This page was built for publication: Key-private proxy re-encryption under LWE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2872038)