Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
From MaRDI portal
Publication:3098009
DOI10.1007/978-3-642-25141-2_14zbMATH Open1344.94052OpenAlexW21616894MaRDI QIDQ3098009FDOQ3098009
Authors: Ryotaro Hayashi, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, Koji Okada
Publication date: 10 November 2011
Published in: Advances in Information and Computer Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25141-2_14
Recommendations
Cites Work
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Title not available (Why is that?)
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Title not available (Why is that?)
- Efficient Unidirectional Proxy Re-Encryption
- Chosen-ciphertext secure certificateless proxy re-encryption
- Tracing Malicious Proxies in Proxy Re-encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Public Key Cryptography - PKC 2005
Cited In (2)
This page was built for publication: Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3098009)