Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
From MaRDI portal
Publication:990087
Recommendations
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- Collusion resistant identity based proxy re-encryption scheme on lattices
- On the security of two identity-based conditional proxy re-encryption schemes
- A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model
- Breaking an identity-based encryption scheme based on DHIES
Cites work
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- Identity-Based Proxy Re-encryption
- Identity-Based Proxy Re-encryption Without Random Oracles
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Proxy Re-encryption Systems for Identity-Based Encryption
Cited in
(3)
This page was built for publication: Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q990087)