Identity-Based Proxy Re-encryption

From MaRDI portal
Publication:3612388

DOI10.1007/978-3-540-72738-5_19zbMath1214.94045OpenAlexW1890078278MaRDI QIDQ3612388

No author found.

Publication date: 10 March 2009

Published in: Applied Cryptography and Network Security (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-72738-5_19




Related Items

Identity-based re-encryption scheme with lightweight re-encryption key generationCCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oraclesHierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data SharingMulti-use and unidirectional identity-based proxy re-encryption schemesAttribute-based conditional proxy re-encryption in the standard model under LWEIdentity-based data storage scheme with anonymous key generation in fog computingOn the security of two identity-based conditional proxy re-encryption schemesCertificateless Proxy Re-Encryption Without PairingsAn efficient signcryption for data access control in cloud computingSecure server-aided data sharing clique with attestationForward-secure revocable identity-based encryptionSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceChosen-ciphertext secure bidirectional proxy re-encryption schemes without pairingsDFE-IP: delegatable functional encryption for inner productThreshold proxy re-signatureEfficient bidirectional proxy re-encryption with direct chosen-ciphertext securityA New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusionBackdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networksHRA-secure attribute-based threshold proxy re-encryption from latticesLattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud EnvironmentRe-encryption method designed by row complete matrixCooperative private searching in cloudsChosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertextsImproved proxy re-encryption schemes with applications to secure distributed storageFully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryptionChosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchFlexible attribute-based proxy re-encryption for efficient data sharingPRE: stronger security notions and efficient construction with non-interactive openingMulti-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryptionTracing Malicious Proxies in Proxy Re-encryptionSecurity vulnerability in a non-interactive ID-based proxy re-encryption schemeUnidirectional Chosen-Ciphertext Secure Proxy Re-encryptionCollusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard modelCiphertext-policy hierarchical attribute-based encryption with short ciphertextsConstant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscationA CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing systemA Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud SharingProxy Re-encryption with Delegatable VerifiabilityConditional Proxy Broadcast Re-EncryptionEfficient Conditional Proxy Re-encryption with Chosen-Ciphertext SecurityChosen-Ciphertext Secure Proxy Re-encryption without PairingsType-Based Proxy Re-encryption and Its ConstructionTime-and-ID-based proxy reencryption schemeMulti-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting