A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
From MaRDI portal
Publication:5458217
Recommendations
Cites work
- scientific article; zbMATH DE number 2009961 (Why is no real title available?)
- scientific article; zbMATH DE number 2009971 (Why is no real title available?)
- scientific article; zbMATH DE number 2081084 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1424177 (Why is no real title available?)
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Information Security and Cryptology
- Progress in Cryptology - INDOCRYPT 2004
- Secure integration of asymmetric and symmetric encryption schemes
Cited in
(6)- scientific article; zbMATH DE number 1424177 (Why is no real title available?)
- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model
- How to construct secure proxy cryptosystem
- Information Security and Cryptology
- Provably secure certificate-based signature scheme without pairings
- Certificate-based proxy decryption systems with revocability in the standard model
This page was built for publication: A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458217)