CCA proxy re-encryption without bilinear maps in the standard model
From MaRDI portal
Publication:3562901
DOI10.1007/978-3-642-13013-7_16zbMATH Open1279.94100OpenAlexW1509800602MaRDI QIDQ3562901FDOQ3562901
Authors: Toshihide Matsuda, Ryo Nishimaki, Keisuke Tanaka
Publication date: 28 May 2010
Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_16
Recommendations
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Proxy re-encryption in a stronger security model extended from CT-RSA2012
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Efficient Unidirectional Proxy Re-Encryption
- A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model
Cited In (15)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
- On the security of a bidirectional proxy re-encryption scheme from PKC 2010
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- On the security of two identity-based conditional proxy re-encryption schemes
- Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Proxy re-encryption in a stronger security model extended from CT-RSA2012
- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
This page was built for publication: CCA proxy re-encryption without bilinear maps in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3562901)