On the security of two identity-based conditional proxy re-encryption schemes
From MaRDI portal
Publication:338380
DOI10.1016/J.TCS.2016.08.023zbMATH Open1371.94641OpenAlexW2516093999WikidataQ115036520 ScholiaQ115036520MaRDI QIDQ338380FDOQ338380
Authors: Kai He, Jian Weng, Robert H. Deng, Joseph K. Liu
Publication date: 4 November 2016
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2016.08.023
Recommendations
- Identity-Based Proxy Re-encryption Without Random Oracles
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- Anonymous conditional proxy re-encryption without random oracle
- Identity-Based Proxy Re-encryption
Cites Work
- Identity-based cryptosystems and signature schemes
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- Title not available (Why is that?)
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Factoring-based proxy re-encryption schemes
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- Fully secure unidirectional identity-based proxy re-encryption
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- CCA proxy re-encryption without bilinear maps in the standard model
- Identity-Based Proxy Re-encryption
- Inter-domain Identity-Based Proxy Re-encryption
- Title not available (Why is that?)
- Proxy re-encryption in a stronger security model extended from CT-RSA2012
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Information and Communications Security
- Proxy Re-encryption Systems for Identity-Based Encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Type-Based Proxy Re-encryption and Its Construction
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
Cited In (3)
This page was built for publication: On the security of two identity-based conditional proxy re-encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q338380)