scientific article; zbMATH DE number 1303118
From MaRDI portal
Publication:4249633
zbMATH Open0929.68048MaRDI QIDQ4249633FDOQ4249633
Authors: Matthew Blaze, Gerrit Bleumer, M. Strauss
Publication date: 17 June 1999
Title of this publication is not available (Why is that?)
Recommendations
Cited In (only showing first 100 items - show all)
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Providing data confidentiality against malicious hosts in shared data spaces
- Proxy Re-signature Schemes Without Random Oracles
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Adaptable key-policy attribute-based encryption with time interval
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Conditional Proxy Broadcast Re-Encryption
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- How to construct secure proxy cryptosystem
- Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
- PRE: stronger security notions and efficient construction with non-interactive opening
- Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
- Secure proxy signature schemes for delegation of signing rights
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
- Breaking and fixing anonymous credentials for the cloud
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- Attribute-based conditional proxy re-encryption in the standard model under LWE
- Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
- Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
- Cooperative private searching in clouds
- Efficient attribute-based proxy re-encryption with constant size ciphertexts
- Identity-based data storage scheme with anonymous key generation in fog computing
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
- Time-and-ID-based proxy reencryption scheme
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
- On the security of two identity-based conditional proxy re-encryption schemes
- Attribute-based proxy re-encryption from standard lattices
- Functional encryption: deterministic to randomized functions from simple assumptions
- Revocable attribute-based proxy re-encryption
- Identity-based proxy re-signatures from lattices
- An efficient key recovery attack against NTRUReEncrypt from AsiaCCS 2015
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Type-Based Proxy Re-encryption and Its Construction
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Cryptographic reverse firewall via malleable smooth projective hash functions
- Cryptography with updates
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Threshold proxy re-signature
- Universal proxy re-encryption
- Updatable signatures and message authentication codes
- Certificateless proxy re-encryption without pairings
- Server-aided private set intersection based on reputation
- Reconciling non-malleability with homomorphic encryption
- A survey on design and implementation of protected searchable data in the cloud
- Timed-release computational secret sharing and threshold encryption
- DFE-IP: delegatable functional encryption for inner product
- Re-encryption method designed by row complete matrix
- Proxy Re-signatures in the Standard Model
- Certificate-based proxy decryption systems with revocability in the standard model
- Securely obfuscating re-encryption
- Tracing Malicious Proxies in Proxy Re-encryption
- OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges
- Key-Private Proxy Re-encryption
- Proxy re-encryption with keyword search
- Chosen ciphertext secure attribute-based encryption with outsourced decryption
- Updatable tokenization: formal definitions and provably secure constructions
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
- (Inner-product) functional encryption with updatable ciphertexts
- Unidirectional updatable encryption and proxy re-encryption from DDH
- Identity-based proxy re-encryption based on SM9
- Ciphertext-policy attribute based encryption supporting access policy update
- A homomorphic proxy re-encryption from lattices
- A strong designated verifier proxy re-signature scheme for IoT environments
- Attribute-based re-encryption scheme in the standard model
- A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication
- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
- Polynomial-time key-recovery attacks against \texttt{NTRUReEncrypt} from ASIACCS'15
- Proxy re-encryption with delegatable verifiability
- Secure collaborative outsourced \(k\)-nearest neighbor classification with multiple owners in cloud environment
- Steganography-free zero-knowledge
- Fine-grained proxy re-encryption: definitions and constructions from LWE
- Homomorphic proxy re-authenticators and applications to verifiable multi-user data aggregation
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
- Stability-guaranteed dynamic ElGamal cryptosystem for encrypted control systems
- Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting
- Epoch confidentiality in updatable encryption
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
- HRA-secure attribute-based threshold proxy re-encryption from lattices
- Secure server-aided data sharing clique with attestation
- Identity-based re-encryption scheme with lightweight re-encryption key generation
- Chosen-ciphertext secure dual-receiver encryption in the standard model based on post-quantum assumptions
- Multi-hop fine-grained proxy re-encryption
- Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions
- Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
- Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm
- Development on security models for proxy re-encryption schemes
- EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- Time-based attribute-based proxy re-encryption with decryption key update
- A general framework for secure sharing of personal health records in cloud system
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249633)