Securely obfuscating re-encryption
From MaRDI portal
Publication:656916
DOI10.1007/S00145-010-9077-7zbMATH Open1251.94031OpenAlexW1981398410WikidataQ123188893 ScholiaQ123188893MaRDI QIDQ656916FDOQ656916
Authors: Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan
Publication date: 13 January 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-010-9077-7
Recommendations
- Securely Obfuscating Re-encryption
- Efficiently obfuscating re-encryption program under DDH assumption
- A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
- Secure obfuscation for encrypted signatures
- Functional Re-encryption and Collusion-Resistant Obfuscation
Cites Work
- Probabilistic encryption
- A theory of the learnable
- Advances in Cryptology – CRYPTO 2004
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Title not available (Why is that?)
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Correcting errors without leaking partial information
- Title not available (Why is that?)
- On obfuscating point functions
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Obfuscation for Cryptographic Purposes
Cited In (10)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Secure obfuscation for encrypted signatures
- Securely Obfuscating Re-encryption
- Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
- A secure symmetric encryption scheme based on an obfuscator
- Universal proxy re-encryption
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
- Efficiently obfuscating re-encryption program under DDH assumption
- A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
- Obfuscating conjunctions
This page was built for publication: Securely obfuscating re-encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q656916)