Anonymous ID-based proxy re-encryption
From MaRDI portal
Publication:2907385
DOI10.1007/978-3-642-31448-3_27zbMATH Open1308.94089OpenAlexW6981671MaRDI QIDQ2907385FDOQ2907385
Authors:
Publication date: 7 September 2012
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-31448-3_27
Recommendations
Cited In (7)
- Identity-Based Proxy Re-encryption
- Fine-grained proxy re-encryption: definitions and constructions from LWE
- Identity-based data storage scheme with anonymous key generation in fog computing
- Anonymous identity-based encryption with identity recovery
- Proxy Re-encryption Systems for Identity-Based Encryption
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Fully secure unidirectional identity-based proxy re-encryption
This page was built for publication: Anonymous ID-based proxy re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2907385)