Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
From MaRDI portal
Publication:990087
DOI10.1016/J.IPL.2009.09.010zbMATH Open1209.68225OpenAlexW2036738256WikidataQ114261295 ScholiaQ114261295MaRDI QIDQ990087FDOQ990087
Authors: J. Martínez
Publication date: 2 September 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2009.09.010
Recommendations
- New identity-based proxy re-encryption schemes to prevent collusion attacks
- Collusion resistant identity based proxy re-encryption scheme on lattices
- On the security of two identity-based conditional proxy re-encryption schemes
- A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model
- Breaking an identity-based encryption scheme based on DHIES
Cites Work
Cited In (3)
This page was built for publication: Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q990087)