Pages that link to "Item:Q3600514"
From MaRDI portal
The following pages link to Tracing Malicious Proxies in Proxy Re-encryption (Q3600514):
Displaying 9 items.
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings (Q621615) (← links)
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems (Q1998999) (← links)
- What about Bob? The inadequacy of CPA security for proxy reencryption (Q2289434) (← links)
- Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption (Q3098009) (← links)
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security (Q3399207) (← links)
- Improved proxy re-encryption schemes with applications to secure distributed storage (Q3546459) (← links)
- Conditional Proxy Broadcast Re-Encryption (Q3634503) (← links)
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation (Q5919024) (← links)