Pages that link to "Item:Q3562901"
From MaRDI portal
The following pages link to CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model (Q3562901):
Displayed 11 items.
- On the security of two identity-based conditional proxy re-encryption schemes (Q338380) (← links)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search (Q690450) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems (Q1998999) (← links)
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts (Q2453123) (← links)
- EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption (Q2509596) (← links)
- Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption (Q2790055) (← links)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption (Q2890017) (← links)
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles (Q5046387) (← links)
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing (Q5056013) (← links)
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation (Q5919024) (← links)