Proxy re-encryption with keyword search
From MaRDI portal
Publication:985079
Recommendations
Cites work
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- CCA-Secure Proxy Re-encryption without Pairings
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Deterministic and Efficiently Searchable Encryption
- Identity-Based Encryption from the Weil Pairing
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
Cited in
(21)- Public Key Encryption with Authorized Keyword Search
- scientific article; zbMATH DE number 1424177 (Why is no real title available?)
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Proxy re-encryption scheme supporting a selection of delegatees
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Key-Private Proxy Re-encryption
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search
- Generic construction of designated tester public-key encryption with keyword search
- Progress in Cryptology - INDOCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
- Public-key authenticated encryption with keyword search revisited: security model and constructions
- scientific article; zbMATH DE number 1941248 (Why is no real title available?)
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
- Public Key Encryption That Allows PIR Queries
- Certificate-based proxy decryption systems with revocability in the standard model
- Public key authenticated searchable encryption against frequency analysis attacks
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
This page was built for publication: Proxy re-encryption with keyword search
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q985079)