Pages that link to "Item:Q3612388"
From MaRDI portal
The following pages link to Identity-Based Proxy Re-encryption (Q3612388):
Displaying 43 items.
- On the security of two identity-based conditional proxy re-encryption schemes (Q338380) (← links)
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Cooperative private searching in clouds (Q455980) (← links)
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings (Q621615) (← links)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search (Q690450) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Security vulnerability in a non-interactive ID-based proxy re-encryption scheme (Q990087) (← links)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (Q1791671) (← links)
- Threshold proxy re-signature (Q1937783) (← links)
- Re-encryption method designed by row complete matrix (Q1954746) (← links)
- Flexible attribute-based proxy re-encryption for efficient data sharing (Q1999111) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model (Q2031043) (← links)
- Attribute-based conditional proxy re-encryption in the standard model under LWE (Q2148755) (← links)
- Identity-based data storage scheme with anonymous key generation in fog computing (Q2152910) (← links)
- Time-and-ID-based proxy reencryption scheme (Q2336347) (← links)
- An efficient signcryption for data access control in cloud computing (Q2398117) (← links)
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts (Q2453123) (← links)
- Multi-use and unidirectional identity-based proxy re-encryption schemes (Q2638201) (← links)
- Secure server-aided data sharing clique with attestation (Q2663469) (← links)
- Forward-secure revocable identity-based encryption (Q2673062) (← links)
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984) (← links)
- Proxy Re-encryption with Delegatable Verifiability (Q2817808) (← links)
- Certificateless Proxy Re-Encryption Without Pairings (Q3193254) (← links)
- Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption (Q3297496) (← links)
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security (Q3399207) (← links)
- Improved proxy re-encryption schemes with applications to secure distributed storage (Q3546459) (← links)
- Tracing Malicious Proxies in Proxy Re-encryption (Q3600514) (← links)
- Conditional Proxy Broadcast Re-Encryption (Q3634503) (← links)
- Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment (Q4605643) (← links)
- Identity-based re-encryption scheme with lightweight re-encryption key generation (Q5031868) (← links)
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles (Q5046387) (← links)
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing (Q5056013) (← links)
- A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing (Q5216982) (← links)
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption (Q5445463) (← links)
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings (Q5502747) (← links)
- Type-Based Proxy Re-encryption and Its Construction (Q5504618) (← links)
- Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting (Q5859633) (← links)
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation (Q5919024) (← links)
- DFE-IP: delegatable functional encryption for inner product (Q6095585) (← links)
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks (Q6191626) (← links)
- HRA-secure attribute-based threshold proxy re-encryption from lattices (Q6192306) (← links)