Proxy re-encryption with keyword search
From MaRDI portal
Publication:985079
DOI10.1016/J.INS.2010.03.026zbMATH Open1191.94100OpenAlexW1992259749WikidataQ121094924 ScholiaQ121094924MaRDI QIDQ985079FDOQ985079
Authors: Jun Shao, Huang Lin, Zhenfu Cao, Xiao-Hui Liang
Publication date: 20 July 2010
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.03.026
Recommendations
random oracle modelproxy re-encryptionpublic key encryption with keyword searchmdbdhproxy re-encryption with keyword search
Cites Work
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Identity-Based Encryption from the Weil Pairing
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Title not available (Why is that?)
- CCA-Secure Proxy Re-encryption without Pairings
- Deterministic and Efficiently Searchable Encryption
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
Cited In (21)
- Title not available (Why is that?)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Advances in Cryptology - EUROCRYPT 2004
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Title not available (Why is that?)
- Public Key Encryption That Allows PIR Queries
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
- LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
- Proxy re-encryption scheme supporting a selection of delegatees
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Public Key Encryption with Authorized Keyword Search
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Generic construction of designated tester public-key encryption with keyword search
- Certificate-based proxy decryption systems with revocability in the standard model
- Progress in Cryptology - INDOCRYPT 2004
- Public-key authenticated encryption with keyword search revisited: security model and constructions
- Key-Private Proxy Re-encryption
- Public key authenticated searchable encryption against frequency analysis attacks
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
This page was built for publication: Proxy re-encryption with keyword search
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q985079)