Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
From MaRDI portal
Publication:3098009
Recommendations
Cites work
- scientific article; zbMATH DE number 1302836 (Why is no real title available?)
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- CCA-Secure Proxy Re-encryption without Pairings
- Chosen-ciphertext secure certificateless proxy re-encryption
- Efficient Unidirectional Proxy Re-Encryption
- Improved proxy re-encryption schemes with applications to secure distributed storage
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- Public Key Cryptography - PKC 2005
- Tracing Malicious Proxies in Proxy Re-encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
Cited in
(2)
This page was built for publication: Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3098009)