CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
From MaRDI portal
Publication:5046387
DOI10.1007/s11432-010-0047-3zbMath1497.94127OpenAlexW2110356978WikidataQ121112972 ScholiaQ121112972MaRDI QIDQ5046387
Jian Weng, Robert H. Deng, Min-Rong Chen, Feng Bao, Yanjiang Yang, Ke-Fei Chen
Publication date: 28 October 2022
Published in: Science China Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11432-010-0047-3
Related Items
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles, Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing, On the security of two identity-based conditional proxy re-encryption schemes, Secure server-aided data sharing clique with attestation, Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings, Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security, Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption, EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
Cites Work
- Unnamed Item
- Unnamed Item
- On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Efficient Unidirectional Proxy Re-Encryption
- CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model
- Identity-Based Proxy Re-encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Conditional Proxy Broadcast Re-Encryption
- Anonymous Conditional Proxy Re-encryption without Random Oracle
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Advances in Cryptology - EUROCRYPT 2004
- Fuzzy Identity-Based Encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Type-Based Proxy Re-encryption and Its Construction