Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
From MaRDI portal
Publication:5445463
DOI10.1007/978-3-540-78440-1_21zbMATH Open1162.94382OpenAlexW2102355710MaRDI QIDQ5445463FDOQ5445463
Authors: Benoît Libert, Damien Vergnaud
Publication date: 5 March 2008
Published in: Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78440-1_21
Recommendations
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Efficient Unidirectional Proxy Re-Encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
Cites Work
- Identity-based cryptosystems and signature schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Public Key Cryptography - PKC 2006
- Theory of Cryptography
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Title not available (Why is that?)
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Identity-Based Proxy Re-encryption
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Topics in Cryptology – CT-RSA 2005
- Securely Obfuscating Re-encryption
- Public Key Cryptography - PKC 2005
- Title not available (Why is that?)
Cited In (55)
- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
- Fine-grained proxy re-encryption: definitions and constructions from LWE
- HRA-secure attribute-based threshold proxy re-encryption from lattices
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions
- Efficiently obfuscating re-encryption program under DDH assumption
- Multi-key Homomorphic Proxy Re-Encryption
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
- RCCA-secure multi-use bidirectional proxy re-encryption with master secret security
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Conditional Proxy Broadcast Re-Encryption
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication
- Improved proxy re-encryption schemes with applications to secure distributed storage
- PRE: stronger security notions and efficient construction with non-interactive opening
- Structure-preserving signatures and commitments to group elements
- Proxy re-encryption with delegatable verifiability
- Secure blind decryption
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
- Chosen-ciphertext secure certificateless proxy re-encryption
- On the security of a bidirectional proxy re-encryption scheme from PKC 2010
- Efficient attribute-based proxy re-encryption with constant size ciphertexts
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Time-and-ID-based proxy reencryption scheme
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
- On the security of two identity-based conditional proxy re-encryption schemes
- Identity-based proxy re-signatures from lattices
- SCRAPE: scalable randomness attested by public entities
- Identity-based re-encryption scheme with lightweight re-encryption key generation
- Efficient completely context-hiding quotable and linearly homomorphic signatures
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Threshold proxy re-signature
- Universal proxy re-encryption
- EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
- Towards user-friendly cryptography
- Public Verifiability from Pairings in Secret Sharing Schemes
- Compact hierarchical identity-based encryption based on a Harder decisional problem
- Re-encryption method designed by row complete matrix
- Efficient Unidirectional Proxy Re-Encryption
- Tracing Malicious Proxies in Proxy Re-encryption
- Key-Private Proxy Re-encryption
- Proxy re-encryption with keyword search
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
- Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
This page was built for publication: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5445463)