HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
DOI10.1142/S0129054110007726zbMATH Open1213.68251OpenAlexW2076041645WikidataQ123189991 ScholiaQ123189991MaRDI QIDQ3069744FDOQ3069744
Authors: Yanli Ren, Xinpengu Zhang, Dawu Gu, Shuozhong Wang
Publication date: 19 January 2011
Published in: International Journal of Foundations of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0129054110007726
Recommendations
- Identity-Based Proxy Re-encryption Without Random Oracles
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- scientific article; zbMATH DE number 2086725
- Identity-Based Proxy Re-encryption
- Proxy Re-encryption Systems for Identity-Based Encryption
identity-based encryptionhierarchicalproxy re-encryptionwithout random oraclesmultiple re-encryptions
Cites Work
Cited In (8)
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Identity-Based Proxy Re-encryption Without Random Oracles
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- Identity-based proxy re-encryption with threshold multi-proxy
- Identity-based re-encryption scheme with lightweight re-encryption key generation
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Fully secure unidirectional identity-based proxy re-encryption
This page was built for publication: HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3069744)