Pages that link to "Item:Q3546459"
From MaRDI portal
The following pages link to Improved proxy re-encryption schemes with applications to secure distributed storage (Q3546459):
Displaying 50 items.
- On the security of two identity-based conditional proxy re-encryption schemes (Q338380) (← links)
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings (Q621615) (← links)
- Securely obfuscating re-encryption (Q656916) (← links)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search (Q690450) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Proxy re-encryption with keyword search (Q985079) (← links)
- Security vulnerability in a non-interactive ID-based proxy re-encryption scheme (Q990087) (← links)
- Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time (Q1628270) (← links)
- AC-RRNS: anti-collusion secured data sharing scheme for cloud storage (Q1726264) (← links)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (Q1791671) (← links)
- Threshold proxy re-signature (Q1937783) (← links)
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems (Q1998999) (← links)
- Flexible attribute-based proxy re-encryption for efficient data sharing (Q1999111) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model (Q2031043) (← links)
- Universal proxy re-encryption (Q2061932) (← links)
- OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges (Q2079910) (← links)
- Fast and secure updatable encryption (Q2096496) (← links)
- Lattice-based HRA-secure attribute-based proxy re-encryption in standard model (Q2148757) (← links)
- Intelligent cryptography approach for secure distributed big data storage in cloud computing (Q2293028) (← links)
- Encrypted data processing with homomorphic re-encryption (Q2293264) (← links)
- Time-and-ID-based proxy reencryption scheme (Q2336347) (← links)
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts (Q2453123) (← links)
- EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption (Q2509596) (← links)
- Multi-use and unidirectional identity-based proxy re-encryption schemes (Q2638201) (← links)
- Privacy-preserving Krawtchouk moment feature extraction over encrypted image data (Q2666794) (← links)
- Improved security model for public-key authenticated encryption with keyword search (Q2697905) (← links)
- Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption (Q2790055) (← links)
- Secure and Traceable Framework for Data Circulation (Q2817476) (← links)
- Proxy Re-encryption with Delegatable Verifiability (Q2817808) (← links)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption (Q2890017) (← links)
- A Homomorphic Proxy Re-encryption from Lattices (Q2953873) (← links)
- Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption (Q3098009) (← links)
- Certificateless Proxy Re-Encryption Without Pairings (Q3193254) (← links)
- Sharing of Encrypted Files in Blockchain Made Simpler (Q3294780) (← links)
- Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption (Q3297496) (← links)
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security (Q3399207) (← links)
- Attribute-based re-encryption scheme in the standard model (Q3403213) (← links)
- Improved proxy re-encryption schemes with applications to secure distributed storage (Q3546459) (← links)
- An Efficient Dispersal and Encryption Scheme for Secure Distributed Information Storage (Q3569056) (← links)
- Tracing Malicious Proxies in Proxy Re-encryption (Q3600514) (← links)
- Key-Private Proxy Re-encryption (Q3623052) (← links)
- Conditional Proxy Broadcast Re-Encryption (Q3634503) (← links)
- Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment (Q4605643) (← links)
- An efficient safe directory based file protection mechanism (Q4687724) (← links)
- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication (Q4933222) (← links)
- Identity-based re-encryption scheme with lightweight re-encryption key generation (Q5031868) (← links)
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles (Q5046387) (← links)
- Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing (Q5056013) (← links)