CCA-Secure Proxy Re-encryption without Pairings
From MaRDI portal
Publication:3615625
DOI10.1007/978-3-642-00468-1_20zbMath1227.94065OpenAlexW2133141035MaRDI QIDQ3615625
Publication date: 24 March 2009
Published in: Public Key Cryptography – PKC 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00468-1_20
Related Items (19)
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption ⋮ CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles ⋮ Multi-use and unidirectional identity-based proxy re-encryption schemes ⋮ Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security ⋮ Improved proxy re-encryption schemes with applications to secure distributed storage ⋮ Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search ⋮ Mobile access and flexible search over encrypted cloud data in heterogeneous systems ⋮ PRE: stronger security notions and efficient construction with non-interactive opening ⋮ Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption ⋮ Proxy re-encryption with keyword search ⋮ Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption ⋮ EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption ⋮ Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation ⋮ DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation ⋮ Proxy Re-encryption with Delegatable Verifiability ⋮ Conditional Proxy Broadcast Re-Encryption ⋮ Universal proxy re-encryption ⋮ Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption ⋮ Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
This page was built for publication: CCA-Secure Proxy Re-encryption without Pairings