Identity-Based Proxy Re-encryption
From MaRDI portal
Publication:3612388
DOI10.1007/978-3-540-72738-5_19zbMath1214.94045OpenAlexW1890078278MaRDI QIDQ3612388
No author found.
Publication date: 10 March 2009
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-72738-5_19
Related Items
Identity-based re-encryption scheme with lightweight re-encryption key generation ⋮ CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles ⋮ Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing ⋮ Multi-use and unidirectional identity-based proxy re-encryption schemes ⋮ Attribute-based conditional proxy re-encryption in the standard model under LWE ⋮ Identity-based data storage scheme with anonymous key generation in fog computing ⋮ On the security of two identity-based conditional proxy re-encryption schemes ⋮ Certificateless Proxy Re-Encryption Without Pairings ⋮ An efficient signcryption for data access control in cloud computing ⋮ Secure server-aided data sharing clique with attestation ⋮ Forward-secure revocable identity-based encryption ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings ⋮ DFE-IP: delegatable functional encryption for inner product ⋮ Threshold proxy re-signature ⋮ Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security ⋮ A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion ⋮ Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks ⋮ HRA-secure attribute-based threshold proxy re-encryption from lattices ⋮ Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment ⋮ Re-encryption method designed by row complete matrix ⋮ Cooperative private searching in clouds ⋮ Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts ⋮ Improved proxy re-encryption schemes with applications to secure distributed storage ⋮ Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption ⋮ Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search ⋮ Flexible attribute-based proxy re-encryption for efficient data sharing ⋮ PRE: stronger security notions and efficient construction with non-interactive opening ⋮ Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption ⋮ Tracing Malicious Proxies in Proxy Re-encryption ⋮ Security vulnerability in a non-interactive ID-based proxy re-encryption scheme ⋮ Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption ⋮ Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model ⋮ Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts ⋮ Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation ⋮ A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system ⋮ A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing ⋮ Proxy Re-encryption with Delegatable Verifiability ⋮ Conditional Proxy Broadcast Re-Encryption ⋮ Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security ⋮ Chosen-Ciphertext Secure Proxy Re-encryption without Pairings ⋮ Type-Based Proxy Re-encryption and Its Construction ⋮ Time-and-ID-based proxy reencryption scheme ⋮ Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting