Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
From MaRDI portal
Publication:3399207
DOI10.1007/978-3-642-04474-8_13zbMATH Open1307.94106OpenAlexW1519370602MaRDI QIDQ3399207FDOQ3399207
Authors: Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao
Publication date: 29 September 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://research.utwente.nl/en/publications/efficient-conditional-proxy-reencryption-with-chosenciphertext-security(28ecf1d4-e108-431a-a714-ffd0fabfb869).html
Recommendations
- Anonymous conditional proxy re-encryption without random oracle
- Proxy re-encryption in a stronger security model extended from CT-RSA2012
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Conditional Proxy Broadcast Re-Encryption
- Fine-grained conditional proxy re-encryption and application
Cites Work
- Secure integration of asymmetric and symmetric encryption schemes
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Title not available (Why is that?)
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Identity-Based Proxy Re-encryption
- Title not available (Why is that?)
- Proxy Re-encryption Systems for Identity-Based Encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Type-Based Proxy Re-encryption and Its Construction
- Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
- Advances in Cryptology - CRYPTO 2003
- Tracing Malicious Proxies in Proxy Re-encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Conditional Proxy Broadcast Re-Encryption
Cited In (19)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Conditional Proxy Broadcast Re-Encryption
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Anonymous conditional proxy re-encryption without random oracle
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Fine-grained conditional proxy re-encryption and application
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Time-and-ID-based proxy reencryption scheme
- On the security of two identity-based conditional proxy re-encryption schemes
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- A conditional proxy re-encryption scheme based on trapdoor search
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
- Fuzzy conditional proxy re-encryption
This page was built for publication: Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3399207)