Tracing Malicious Proxies in Proxy Re-encryption
From MaRDI portal
Publication:3600514
Recommendations
- Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
- Punishing malicious hosts with the cryptographic traces approach
- Attacks to the proxy re-encryption schemes from IWSEC2011
- Adaptively secure proxy re-encryption
- Proxy re-encryption with unforgeable re-encryption keys
- Towards a secure certificateless proxy re-encryption scheme
- Fine-grained conditional proxy re-encryption and application
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
Cites work
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- scientific article; zbMATH DE number 1030976 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1406785 (Why is no real title available?)
- A public key cryptosystem and a signature scheme based on discrete logarithms
- About the Security of MTI/C0 and MQV
- Advances in Cryptology - EUROCRYPT 2004
- Certificateless public key cryptography
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Compact E-Cash
- Efficient Identity-Based Encryption Without Random Oracles
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Encryption Gone Wild
- Identity-Based Proxy Re-encryption
- Identity-Based Traitor Tracing
- Identity-based cryptosystems and signature schemes
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Optimal probabilistic fingerprint codes
- Pairing-Friendly Elliptic Curves of Prime Order
- Proxy Re-encryption Systems for Identity-Based Encryption
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Securely Obfuscating Re-encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
Cited in
(12)- What about Bob? The inadequacy of CPA security for proxy reencryption
- Conditional Proxy Broadcast Re-Encryption
- Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
- Proxy re-encryption scheme supporting a selection of delegatees
- Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Generic traceable proxy re-encryption and accountable extension in consensus network
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
This page was built for publication: Tracing Malicious Proxies in Proxy Re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600514)