scientific article; zbMATH DE number 1303118
From MaRDI portal
Publication:4249633
zbMath0929.68048MaRDI QIDQ4249633
Gerrit Bleumer, Matthew Blaze, Martin J. Strauss
Publication date: 17 June 1999
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Identity-based re-encryption scheme with lightweight re-encryption key generation, Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption, CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles, Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time, Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing, Multi-use and unidirectional identity-based proxy re-encryption schemes, Attribute-based conditional proxy re-encryption in the standard model under LWE, Lattice-based HRA-secure attribute-based proxy re-encryption in standard model, How to construct secure proxy cryptosystem, Efficient attribute-based proxy re-encryption with constant size ciphertexts, Identity-based data storage scheme with anonymous key generation in fog computing, On the security of two identity-based conditional proxy re-encryption schemes, Certificateless Proxy Re-Encryption Without Pairings, A general framework for secure sharing of personal health records in cloud system, Attribute-based proxy re-encryption from standard lattices, Secure server-aided data sharing clique with attestation, Reconciling non-malleability with homomorphic encryption, Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles, A survey on design and implementation of protected searchable data in the cloud, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update, A Homomorphic Proxy Re-encryption from Lattices, Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings, Unidirectional updatable encryption and proxy re-encryption from DDH, DFE-IP: delegatable functional encryption for inner product, Threshold proxy re-signature, Timed-release computational secret sharing and threshold encryption, Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions, (Inner-product) functional encryption with updatable ciphertexts, Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security, A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion, Secure proxy signature schemes for delegation of signing rights, Steganography-free zero-knowledge, An efficient key recovery attack against NTRUReEncrypt from AsiaCCS 2015, Epoch confidentiality in updatable encryption, Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks, HRA-secure attribute-based threshold proxy re-encryption from lattices, Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment, The cost of adaptivity in security games on graphs, Re-encryption method designed by row complete matrix, Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment, Cooperative private searching in clouds, Proxy Re-signatures in the Standard Model, Securely obfuscating re-encryption, Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, Sharing of Encrypted Files in Blockchain Made Simpler, Improved proxy re-encryption schemes with applications to secure distributed storage, Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption, Breaking and Fixing Anonymous Credentials for the Cloud, Certificate-based proxy decryption systems with revocability in the standard model, Adaptable key-policy attribute-based encryption with time interval, Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search, Mobile access and flexible search over encrypted cloud data in heterogeneous systems, Flexible attribute-based proxy re-encryption for efficient data sharing, Providing data confidentiality against malicious hosts in shared data spaces, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Cryptography with Updates, A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication, PRE: stronger security notions and efficient construction with non-interactive opening, Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption, Proxy re-encryption with keyword search, Tracing Malicious Proxies in Proxy Re-encryption, Security vulnerability in a non-interactive ID-based proxy re-encryption scheme, Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption, Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model, EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption, Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation, A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system, Identity-based proxy re-signatures from lattices, Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key, Proxy Re-signature Schemes Without Random Oracles, Server-aided private set intersection based on reputation, Key-Private Proxy Re-encryption, Revocable attribute-based proxy re-encryption, Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption, Proxy Re-encryption with Delegatable Verifiability, Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing, Conditional Proxy Broadcast Re-Encryption, Universal proxy re-encryption, Updatable signatures and message authentication codes, Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption, Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption, Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security, Attribute-based re-encryption scheme in the standard model, Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines, OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges, Chosen-Ciphertext Secure Proxy Re-encryption without Pairings, Type-Based Proxy Re-encryption and Its Construction, A strong designated verifier proxy re-signature scheme for IoT environments, Updatable Tokenization: Formal Definitions and Provably Secure Constructions, Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation, Time-and-ID-based proxy reencryption scheme, Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting