Universal proxy re-encryption
From MaRDI portal
Publication:2061932
DOI10.1007/978-3-030-75245-3_19OpenAlexW2962826931MaRDI QIDQ2061932
Publication date: 21 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-75245-3_19
Related Items (4)
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO ⋮ Lattice-based HRA-secure attribute-based proxy re-encryption in standard model ⋮ Functional encryption against probabilistic queries: definition, construction and applications ⋮ The direction of updatable encryption does matter
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Securely obfuscating re-encryption
- Probabilistic encryption
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- Strong post-compromise secure proxy re-encryption
- What about Bob? The inadequacy of CPA security for proxy reencryption
- Adaptively secure proxy re-encryption
- Reconfigurable Cryptography: A Flexible Approach to Long-Term Security
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Encryption Switching Protocols
- Practical Multilinear Maps over the Integers
- Key-Private Proxy Re-encryption under LWE
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Functional Re-encryption and Collusion-Resistant Obfuscation
- Universal Signature Aggregators
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Efficient Unidirectional Proxy Re-Encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Key-Private Proxy Re-encryption
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Watermarking Cryptographic Capabilities
- Candidate Multilinear Maps from Ideal Lattices
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
- Obfuscation of Probabilistic Circuits and Applications
- Graph-Induced Multilinear Maps from Lattices
- On the (im)possibility of obfuscating programs
- Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
This page was built for publication: Universal proxy re-encryption