Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
From MaRDI portal
Publication:713423
DOI10.1016/j.ins.2012.04.013zbMath1278.94059OpenAlexW2014671777WikidataQ121985577 ScholiaQ121985577MaRDI QIDQ713423
Publication date: 29 October 2012
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2012.04.013
collusion resistancechosen ciphertext securityID-based proxy re-encryptionmulti-usabilityunidirectionality
Related Items
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing, Attribute-based conditional proxy re-encryption in the standard model under LWE, Identity-based data storage scheme with anonymous key generation in fog computing, On the security of two identity-based conditional proxy re-encryption schemes, Secure server-aided data sharing clique with attestation, Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption, Flexible attribute-based proxy re-encryption for efficient data sharing, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation, Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting
Cites Work
- Unnamed Item
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Efficient Unidirectional Proxy Re-Encryption
- CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model
- Identity-Based Proxy Re-encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings