Anonymous ID-based proxy re-encryption
From MaRDI portal
Publication:2907385
Recommendations
Cited in
(8)- Fine-grained proxy re-encryption: definitions and constructions from LWE
- Identity-based data storage scheme with anonymous key generation in fog computing
- Identity-based proxy re-encryption based on SM9
- Fully secure unidirectional identity-based proxy re-encryption
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Identity-Based Proxy Re-encryption
- Proxy Re-encryption Systems for Identity-Based Encryption
- Anonymous identity-based encryption with identity recovery
This page was built for publication: Anonymous ID-based proxy re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2907385)