On the security of two identity-based conditional proxy re-encryption schemes
From MaRDI portal
(Redirected from Publication:338380)
Recommendations
- Identity-Based Proxy Re-encryption Without Random Oracles
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- Anonymous conditional proxy re-encryption without random oracle
- Identity-Based Proxy Re-encryption
Cites work
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- CCA proxy re-encryption without bilinear maps in the standard model
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Efficient Identity-Based Encryption Without Random Oracles
- Factoring-based proxy re-encryption schemes
- Fully secure unidirectional identity-based proxy re-encryption
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Proxy Re-encryption
- Identity-Based Proxy Re-encryption Without Random Oracles
- Identity-based cryptosystems and signature schemes
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Information and Communications Security
- Inter-domain Identity-Based Proxy Re-encryption
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- Proxy Re-encryption Systems for Identity-Based Encryption
- Proxy re-encryption in a stronger security model extended from CT-RSA2012
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- Type-Based Proxy Re-encryption and Its Construction
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
Cited in
(3)
This page was built for publication: On the security of two identity-based conditional proxy re-encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q338380)