Proxy re-encryption from lattices
From MaRDI portal
Publication:5402965
DOI10.1007/978-3-642-54631-0_5zbMATH Open1335.94060OpenAlexW46948259MaRDI QIDQ5402965FDOQ5402965
Authors: Elena Kirshanova
Publication date: 25 March 2014
Published in: Public-Key Cryptography – PKC 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-54631-0_5
Recommendations
Cited In (15)
- Unidirectional updatable encryption and proxy re-encryption from DDH
- A homomorphic proxy re-encryption from lattices
- Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
- CCA-1 secure updatable encryption with adaptive security
- Fine-grained proxy re-encryption: definitions and constructions from LWE
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting
- Proxy re-encryption and re-signatures from lattices
- Lattice-based dual receiver encryption and more
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
- Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
- Collusion resistant identity based proxy re-encryption scheme on lattices
- Key-private proxy re-encryption under LWE
- Cryptanalysis of an NTRU-based proxy encryption scheme from ASIACCS'15
This page was built for publication: Proxy re-encryption from lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402965)