Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012
From MaRDI portal
Publication:4910245
DOI10.1007/978-3-642-36095-4_18zbMath1312.94061OpenAlexW204567147MaRDI QIDQ4910245
Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
Publication date: 18 March 2013
Published in: Topics in Cryptology – CT-RSA 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36095-4_18
Related Items (7)
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing ⋮ On the security of two identity-based conditional proxy re-encryption schemes ⋮ Certificateless Proxy Re-Encryption Without Pairings ⋮ Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts ⋮ Flexible attribute-based proxy re-encryption for efficient data sharing ⋮ Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption ⋮ Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
This page was built for publication: Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012