On the security of two identity-based conditional proxy re-encryption schemes
From MaRDI portal
Publication:338380
DOI10.1016/j.tcs.2016.08.023zbMath1371.94641OpenAlexW2516093999WikidataQ115036520 ScholiaQ115036520MaRDI QIDQ338380
Jian Weng, Joseph K. Liu, Robert H. Deng, Kai He
Publication date: 4 November 2016
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2016.08.023
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Factoring-Based Proxy Re-Encryption Schemes
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Identity-Based Cryptosystems and Signature Schemes
- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks
- Fully Secure Unidirectional Identity-Based Proxy Re-encryption
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model
- Identity-Based Proxy Re-encryption
- Inter-domain Identity-Based Proxy Re-encryption
- Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012
- A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Information and Communications Security
- Proxy Re-encryption Systems for Identity-Based Encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Type-Based Proxy Re-encryption and Its Construction
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles