Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
From MaRDI portal
Publication:4605643
Recommendations
- A secure cloud data sharing scheme from identity-based proxy re-encryption
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
- A homomorphic proxy re-encryption from lattices
- Encrypted data processing with homomorphic re-encryption
- A novel lattice-based ciphertext-policy attribute-based proxy re-encryption for cloud sharing
Cites work
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- (Leveled) fully homomorphic encryption without bootstrapping
- A homomorphic proxy re-encryption from lattices
- Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Efficient lattice (H)IBE in the standard model
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Generating shorter bases for hard random lattices
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Identity-Based Proxy Re-encryption
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Key-private proxy re-encryption under LWE
- On lattices, learning with errors, random linear codes, and cryptography
- Packing messages and optimizing bootstrapping in GSW-FHE
- Trapdoors for lattices: simpler, tighter, faster, smaller
Cited in
(5)- Encrypted data processing with homomorphic re-encryption
- Attribute-based conditional proxy re-encryption in the standard model under LWE
- Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting
- A novel lattice-based ciphertext-policy attribute-based proxy re-encryption for cloud sharing
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
This page was built for publication: Lattice-based identity-based homomorphic conditional proxy re-encryption for secure big data computing in cloud environment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4605643)