HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
DOI10.1142/S0129054110007726zbMATH Open1213.68251OpenAlexW2076041645WikidataQ123189991 ScholiaQ123189991MaRDI QIDQ3069744FDOQ3069744
Shuozhong Wang, Xinpengu Zhang, Yanli Ren, Dawu Gu
Publication date: 19 January 2011
Published in: International Journal of Foundations of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0129054110007726
Recommendations
- Identity-Based Proxy Re-encryption Without Random Oracles
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- scientific article; zbMATH DE number 2086725
- Identity-Based Proxy Re-encryption
- Proxy Re-encryption Systems for Identity-Based Encryption
identity-based encryptionhierarchicalproxy re-encryptionwithout random oraclesmultiple re-encryptions
Cites Work
Cited In (3)
This page was built for publication: HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3069744)