The following pages link to Key-Private Proxy Re-encryption (Q3623052):
Displaying 19 items.
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Re-encryption method designed by row complete matrix (Q1954746) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- On internal re-keying (Q2039979) (← links)
- Universal proxy re-encryption (Q2061932) (← links)
- OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges (Q2079910) (← links)
- EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption (Q2509596) (← links)
- Multi-use and unidirectional identity-based proxy re-encryption schemes (Q2638201) (← links)
- Proxy Re-encryption with Delegatable Verifiability (Q2817808) (← links)
- Combined Proxy Re-encryption (Q3193253) (← links)
- Efficient Unidirectional Proxy Re-Encryption (Q3558320) (← links)
- Key-Private Proxy Re-encryption (Q3623052) (← links)
- Conditional Proxy Broadcast Re-Encryption (Q3634503) (← links)
- Identity-based re-encryption scheme with lightweight re-encryption key generation (Q5031868) (← links)
- Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting (Q5859633) (← links)
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation (Q5919024) (← links)
- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion (Q6163695) (← links)
- Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions (Q6635894) (← links)
- Multi-hop fine-grained proxy re-encryption (Q6635896) (← links)