Key-private proxy re-encryption under LWE
From MaRDI portal
Publication:2872038
DOI10.1007/978-3-319-03515-4_1zbMATH Open1288.94051OpenAlexW1620415689MaRDI QIDQ2872038FDOQ2872038
Authors: Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Li-hua Wang
Publication date: 14 January 2014
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-03515-4_1
Recommendations
Cited In (18)
- Public key encryption with secure key leasing
- An LWE-based key transfer protocol with anonymity
- On the asymptotic complexity of solving LWE
- A homomorphic proxy re-encryption from lattices
- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
- Polynomial-time key-recovery attacks against \texttt{NTRUReEncrypt} from ASIACCS'15
- Proxy re-encryption from lattices
- Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting
- Attribute-based conditional proxy re-encryption in the standard model under LWE
- Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
- Proxy re-encryption and re-signatures from lattices
- Attribute-based proxy re-encryption from standard lattices
- An efficient key recovery attack against NTRUReEncrypt from AsiaCCS 2015
- The direction of updatable encryption does matter
- Universal proxy re-encryption
- OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges
This page was built for publication: Key-private proxy re-encryption under LWE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2872038)