Efficient Unidirectional Proxy Re-Encryption
From MaRDI portal
Publication:3558320
DOI10.1007/978-3-642-12678-9_19zbMATH Open1284.94064OpenAlexW2116361063MaRDI QIDQ3558320FDOQ3558320
Authors: Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng
Publication date: 4 May 2010
Published in: Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings (Search for Journal in Brave)
Full work available at URL: https://ink.library.smu.edu.sg/sis_research/1316
Recommendations
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
- Fully secure unidirectional identity-based proxy re-encryption
- Proxy re-encryption with unforgeable re-encryption keys
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Universal proxy re-encryption
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Unidirectional updatable encryption and proxy re-encryption from DDH
- Key-Private Proxy Re-encryption
Cited In (27)
- Improved security notions for proxy re-encryption to enforce access control
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Identity-based proxy re-encryption based on SM9
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- PRE: stronger security notions and efficient construction with non-interactive opening
- Proxy re-encryption with delegatable verifiability
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Fine-grained proxy re-encryption: definitions and constructions from LWE
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- A novel lattice-based ciphertext-policy attribute-based proxy re-encryption for cloud sharing
- Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
- A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Universal proxy re-encryption
- Certificateless proxy re-encryption without pairings
- Combined Proxy Re-encryption
- Efficiently obfuscating re-encryption program under DDH assumption
- CCA-Secure Proxy Re-encryption without Pairings
- CCA proxy re-encryption without bilinear maps in the standard model
- Fully secure unidirectional identity-based proxy re-encryption
- Factoring-based proxy re-encryption schemes
- Proxy re-encryption in a stronger security model extended from CT-RSA2012
- Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
This page was built for publication: Efficient Unidirectional Proxy Re-Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3558320)