Efficient Unidirectional Proxy Re-Encryption
From MaRDI portal
Publication:3558320
Recommendations
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
- Fully secure unidirectional identity-based proxy re-encryption
- Proxy re-encryption with unforgeable re-encryption keys
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Universal proxy re-encryption
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Unidirectional updatable encryption and proxy re-encryption from DDH
- Key-Private Proxy Re-encryption
Cited in
(28)- Proxy re-encryption with delegatable verifiability
- Universal proxy re-encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Unidirectional updatable encryption and proxy re-encryption from DDH
- Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
- Efficiently obfuscating re-encryption program under DDH assumption
- Certificateless proxy re-encryption without pairings
- CCA proxy re-encryption without bilinear maps in the standard model
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Fine-grained proxy re-encryption: definitions and constructions from LWE
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- CCA-Secure Proxy Re-encryption without Pairings
- Identity-based proxy re-encryption based on SM9
- Fully secure unidirectional identity-based proxy re-encryption
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Factoring-based proxy re-encryption schemes
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- Proxy re-encryption in a stronger security model extended from CT-RSA2012
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- PRE: stronger security notions and efficient construction with non-interactive opening
- A novel lattice-based ciphertext-policy attribute-based proxy re-encryption for cloud sharing
- Improved security notions for proxy re-encryption to enforce access control
- Combined Proxy Re-encryption
- A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model
This page was built for publication: Efficient Unidirectional Proxy Re-Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3558320)