Improved proxy re-encryption schemes with applications to secure distributed storage
From MaRDI portal
Publication:3546459
DOI10.1145/1127345.1127346zbMATH Open1281.94070OpenAlexW2114428623WikidataQ130862385 ScholiaQ130862385MaRDI QIDQ3546459FDOQ3546459
Authors:
Publication date: 21 December 2008
Published in: ACM Transactions on Information and System Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1127345.1127346
Recommendations
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Advances in Cryptology - EUROCRYPT 2004
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Identity-Based Proxy Re-encryption
- Title not available (Why is that?)
- Proxy Re-encryption Systems for Identity-Based Encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Type-Based Proxy Re-encryption and Its Construction
- Advances in Cryptology - CRYPTO 2003
- Tracing Malicious Proxies in Proxy Re-encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Realizing Hash-and-Sign Signatures under Standard Assumptions
- Conditional Proxy Broadcast Re-Encryption
Cited In (74)
- Multi-key Homomorphic Proxy Re-Encryption
- AC-RRNS: anti-collusion secured data sharing scheme for cloud storage
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
- Encrypted data processing with homomorphic re-encryption
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Conditional Proxy Broadcast Re-Encryption
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- A homomorphic proxy re-encryption from lattices
- Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Attribute-based re-encryption scheme in the standard model
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
- PRE: stronger security notions and efficient construction with non-interactive opening
- Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
- Secure and traceable framework for data circulation
- Proxy re-encryption with delegatable verifiability
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- Intelligent cryptography approach for secure distributed big data storage in cloud computing
- Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Time-and-ID-based proxy reencryption scheme
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
- On the security of two identity-based conditional proxy re-encryption schemes
- Functional encryption: deterministic to randomized functions from simple assumptions
- Computational Science and Its Applications – ICCSA 2004
- Privacy-preserving Krawtchouk moment feature extraction over encrypted image data
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Type-Based Proxy Re-encryption and Its Construction
- Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Cryptography with updates
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Threshold proxy re-signature
- Universal proxy re-encryption
- Certificateless proxy re-encryption without pairings
- Fast and secure updatable encryption
- EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
- An efficient safe directory based file protection mechanism
- On Consistency of Encrypted Files
- DFE-IP: delegatable functional encryption for inner product
- Securely obfuscating re-encryption
- Improved security model for public-key authenticated encryption with keyword search
- Tracing Malicious Proxies in Proxy Re-encryption
- OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges
- Key-Private Proxy Re-encryption
- Proxy re-encryption with keyword search
- Sharing of encrypted files in blockchain made simpler
- Fully secure hidden ciphertext-policy attribute-based proxy re-encryption
- Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
- (Inner-product) functional encryption with updatable ciphertexts
- Unidirectional updatable encryption and proxy re-encryption from DDH
- A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication
- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
- Fine-grained proxy re-encryption: definitions and constructions from LWE
- Homomorphic proxy re-authenticators and applications to verifiable multi-user data aggregation
- Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
- HRA-secure attribute-based threshold proxy re-encryption from lattices
- Identity-based re-encryption scheme with lightweight re-encryption key generation
- Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions
- Faster optimal ate pairings for cyclotomic sparse families of pairing-friendly elliptic curves with embedding degrees \(k=5,7\)
- Development on security models for proxy re-encryption schemes
- Integrating FPGA/ASIC into cryptographic storage systems to avoid re-encryption
- An Efficient Dispersal and Encryption Scheme for Secure Distributed Information Storage
- Efficiently obfuscating re-encryption program under DDH assumption
This page was built for publication: Improved proxy re-encryption schemes with applications to secure distributed storage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3546459)