Type-Based Proxy Re-encryption and Its Construction
From MaRDI portal
Publication:5504618
DOI10.1007/978-3-540-89754-5_11zbMATH Open1203.94126OpenAlexW2156318122MaRDI QIDQ5504618FDOQ5504618
Authors: Qiang Tang
Publication date: 22 January 2009
Published in: Progress in Cryptology - INDOCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://research.utwente.nl/en/publications/typebased-proxy-reencryption-and-its-construction(34d7731f-234a-4c8c-b0a8-a1f652248a1b).html
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Title not available (Why is that?)
- Title not available (Why is that?)
- Compact E-Cash
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Identity-Based Proxy Re-encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- Proxy Re-encryption Systems for Identity-Based Encryption
- Type-Based Proxy Re-encryption and Its Construction
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
Cited In (19)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Conditional Proxy Broadcast Re-Encryption
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
- Improved proxy re-encryption schemes with applications to secure distributed storage
- PRE: stronger security notions and efficient construction with non-interactive opening
- Proxy re-encryption with delegatable verifiability
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Time-and-ID-based proxy reencryption scheme
- PRTA: a proxy re-encryption based trusted authorization scheme for nodes on CloudIoT
- On the security of two identity-based conditional proxy re-encryption schemes
- Type-Based Proxy Re-encryption and Its Construction
- Further improvement of a dynamic type and identity-based proxy re-encryption scheme
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
This page was built for publication: Type-Based Proxy Re-encryption and Its Construction
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5504618)