The following pages link to (Q4249633):
Displaying 50 items.
- On the security of two identity-based conditional proxy re-encryption schemes (Q338380) (← links)
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles (Q387810) (← links)
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Secure proxy signature schemes for delegation of signing rights (Q421030) (← links)
- Cooperative private searching in clouds (Q455980) (← links)
- Certificate-based proxy decryption systems with revocability in the standard model (Q497594) (← links)
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings (Q621615) (← links)
- Securely obfuscating re-encryption (Q656916) (← links)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search (Q690450) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Providing data confidentiality against malicious hosts in shared data spaces (Q967526) (← links)
- Proxy re-encryption with keyword search (Q985079) (← links)
- Security vulnerability in a non-interactive ID-based proxy re-encryption scheme (Q990087) (← links)
- Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time (Q1628270) (← links)
- A survey on design and implementation of protected searchable data in the cloud (Q1686146) (← links)
- Timed-release computational secret sharing and threshold encryption (Q1692147) (← links)
- Adaptable key-policy attribute-based encryption with time interval (Q1741937) (← links)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (Q1791671) (← links)
- Threshold proxy re-signature (Q1937783) (← links)
- Re-encryption method designed by row complete matrix (Q1954746) (← links)
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems (Q1998999) (← links)
- Flexible attribute-based proxy re-encryption for efficient data sharing (Q1999111) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model (Q2031043) (← links)
- Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key (Q2037197) (← links)
- Revocable attribute-based proxy re-encryption (Q2048189) (← links)
- Universal proxy re-encryption (Q2061932) (← links)
- Updatable signatures and message authentication codes (Q2061942) (← links)
- OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges (Q2079910) (← links)
- Attribute-based conditional proxy re-encryption in the standard model under LWE (Q2148755) (← links)
- Lattice-based HRA-secure attribute-based proxy re-encryption in standard model (Q2148757) (← links)
- Efficient attribute-based proxy re-encryption with constant size ciphertexts (Q2152056) (← links)
- Identity-based data storage scheme with anonymous key generation in fog computing (Q2152910) (← links)
- Server-aided private set intersection based on reputation (Q2293036) (← links)
- A strong designated verifier proxy re-signature scheme for IoT environments (Q2333880) (← links)
- Time-and-ID-based proxy reencryption scheme (Q2336347) (← links)
- How to construct secure proxy cryptosystem (Q2384529) (← links)
- A general framework for secure sharing of personal health records in cloud system (Q2403233) (← links)
- Reconciling non-malleability with homomorphic encryption (Q2408582) (← links)
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts (Q2453123) (← links)
- EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption (Q2509596) (← links)
- Identity-based proxy re-signatures from lattices (Q2512816) (← links)
- Multi-use and unidirectional identity-based proxy re-encryption schemes (Q2638201) (← links)
- Attribute-based proxy re-encryption from standard lattices (Q2661778) (← links)
- Secure server-aided data sharing clique with attestation (Q2663469) (← links)
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984) (← links)
- The cost of adaptivity in security games on graphs (Q2697875) (← links)
- Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption (Q2817488) (← links)
- Proxy Re-encryption with Delegatable Verifiability (Q2817808) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)