CCA-Secure Proxy Re-encryption without Pairings

From MaRDI portal
Publication:3615625

DOI10.1007/978-3-642-00468-1_20zbMath1227.94065OpenAlexW2133141035MaRDI QIDQ3615625

Jun Shao, Zhen Fu Cao

Publication date: 24 March 2009

Published in: Public Key Cryptography – PKC 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-00468-1_20




Related Items (19)

Generic Construction of Chosen Ciphertext Secure Proxy Re-EncryptionCCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oraclesMulti-use and unidirectional identity-based proxy re-encryption schemesEfficient bidirectional proxy re-encryption with direct chosen-ciphertext securityImproved proxy re-encryption schemes with applications to secure distributed storageChosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchMobile access and flexible search over encrypted cloud data in heterogeneous systemsPRE: stronger security notions and efficient construction with non-interactive openingMulti-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryptionProxy re-encryption with keyword searchRe-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-EncryptionEFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryptionConstant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscationDMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User RevocationProxy Re-encryption with Delegatable VerifiabilityConditional Proxy Broadcast Re-EncryptionUniversal proxy re-encryptionUnforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-EncryptionEfficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security




This page was built for publication: CCA-Secure Proxy Re-encryption without Pairings