A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
From MaRDI portal
Publication:5458217
DOI10.1007/978-3-540-77026-8_22zbMATH Open1153.94436OpenAlexW1508632300MaRDI QIDQ5458217FDOQ5458217
Authors: Li-hua Wang, Jun Shao, Masahiro Mambo, Akihiro Yamamura, Zhenfu Cao
Publication date: 11 April 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77026-8_22
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Efficient Identity-Based Encryption Without Random Oracles
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology
- Title not available (Why is that?)
Cited In (6)
- Title not available (Why is that?)
- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model
- How to construct secure proxy cryptosystem
- Information Security and Cryptology
- Provably secure certificate-based signature scheme without pairings
- Certificate-based proxy decryption systems with revocability in the standard model
This page was built for publication: A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458217)