Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
From MaRDI portal
Publication:418306
DOI10.1016/J.CAMWA.2011.11.002zbMATH Open1238.94028OpenAlexW1985881744WikidataQ115100046 ScholiaQ115100046MaRDI QIDQ418306FDOQ418306
Publication date: 28 May 2012
Published in: Computers & Mathematics with Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.camwa.2011.11.002
Recommendations
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
- Efficient Unidirectional Proxy Re-Encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- On the security of a bidirectional proxy re-encryption scheme from PKC 2010
- Chosen-ciphertext secure certificateless proxy re-encryption
- Comments on “Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption”
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Cites Work
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Identity-Based Proxy Re-encryption
- Title not available (Why is that?)
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Proxy Re-encryption Systems for Identity-Based Encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Type-Based Proxy Re-encryption and Its Construction
- Anonymous conditional proxy re-encryption without random oracle
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Efficient Unidirectional Proxy Re-Encryption
- Tracing Malicious Proxies in Proxy Re-encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Key-Private Proxy Re-encryption
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
Cited In (5)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Efficient Unidirectional Proxy Re-Encryption
This page was built for publication: Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q418306)