HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
From MaRDI portal
Publication:3069744
Recommendations
- Identity-Based Proxy Re-encryption Without Random Oracles
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- scientific article; zbMATH DE number 2086725
- Identity-Based Proxy Re-encryption
- Proxy Re-encryption Systems for Identity-Based Encryption
Cited in
(8)- Identity-Based Proxy Re-encryption Without Random Oracles
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- Identity-based proxy re-encryption with threshold multi-proxy
- Fully secure unidirectional identity-based proxy re-encryption
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Identity-based re-encryption scheme with lightweight re-encryption key generation
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3069744)