Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
From MaRDI portal
Publication:3098009
DOI10.1007/978-3-642-25141-2_14zbMath1344.94052OpenAlexW21616894MaRDI QIDQ3098009
Takuya Yoshida, Ryotaro Hayashi, Koji Okada, Yoshihiro Fujii, Tatsuyuki Matsushita
Publication date: 10 November 2011
Published in: Advances in Information and Computer Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25141-2_14
Cites Work
- Unnamed Item
- Unnamed Item
- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Efficient Unidirectional Proxy Re-Encryption
- Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
- Tracing Malicious Proxies in Proxy Re-encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Public Key Cryptography - PKC 2005