Identity-based proxy re-encryption based on SM9
From MaRDI portal
Publication:6573672
Recommendations
Cites work
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- scientific article; zbMATH DE number 2081084 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A CCA-secure collusion-resistant identity-based proxy re-encryption scheme
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- CCA-Secure Proxy Re-encryption without Pairings
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
- Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
- Efficient Unidirectional Proxy Re-Encryption
- Identity-Based Proxy Re-encryption
- Identity-based cryptosystems and signature schemes
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- Security analysis of SM9 key agreement and encryption
This page was built for publication: Identity-based proxy re-encryption based on SM9
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6573672)