Proxy re-encryption with keyword search
From MaRDI portal
Publication:985079
DOI10.1016/j.ins.2010.03.026zbMath1191.94100OpenAlexW1992259749WikidataQ121094924 ScholiaQ121094924MaRDI QIDQ985079
Jun Shao, Huang Lin, Xiao-Hui Liang, Zhen Fu Cao
Publication date: 20 July 2010
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.03.026
random oracle modelproxy re-encryptionpublic key encryption with keyword searchmdbdhproxy re-encryption with keyword search
Related Items
Multi-use and unidirectional identity-based proxy re-encryption schemes, Public-key authenticated encryption with keyword search revisited: security model and constructions, LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search, Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings, Public key authenticated searchable encryption against frequency analysis attacks, Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks, Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Certificate-based proxy decryption systems with revocability in the standard model, Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search, Flexible attribute-based proxy re-encryption for efficient data sharing, Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings, Generic construction of designated tester public-key encryption with keyword search, Public Key Encryption with Authorized Keyword Search
Cites Work
- Unnamed Item
- Unnamed Item
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Deterministic and Efficiently Searchable Encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)