Securely obfuscating re-encryption
From MaRDI portal
Publication:656916
DOI10.1007/S00145-010-9077-7zbMath1251.94031OpenAlexW1981398410WikidataQ123188893 ScholiaQ123188893MaRDI QIDQ656916
Abhi Shelat, Guy N. Rothblum, Susan Hohenberger, Vinod Vaikuntanathan
Publication date: 13 January 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-010-9077-7
Related Items (4)
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES ⋮ Obfuscating conjunctions ⋮ Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search ⋮ Universal proxy re-encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Improved proxy re-encryption schemes with applications to secure distributed storage
- On obfuscating point functions
- Correcting errors without leaking partial information
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Obfuscation for Cryptographic Purposes
- A theory of the learnable
- Advances in Cryptology – CRYPTO 2004
This page was built for publication: Securely obfuscating re-encryption