Attribute-based conditional proxy re-encryption in the standard model under LWE
From MaRDI portal
Publication:2148755
DOI10.1007/978-3-030-88428-4_8zbMath1498.68054OpenAlexW3202403659MaRDI QIDQ2148755
Xiaojian Liang, Zike Jiang, Jian Weng, Zhenghao Wu, Lisha Yao, Anjia Yang
Publication date: 24 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88428-4_8
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Cites Work
- Unnamed Item
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Attribute-based proxy re-encryption from standard lattices
- Key-Private Proxy Re-encryption under LWE
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fine-Grained Conditional Proxy Re-Encryption and Application
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Trapdoors for hard lattices and new cryptographic constructions
- Bonsai Trees, or How to Delegate a Lattice Basis
- Efficient Lattice (H)IBE in the Standard Model
- Identity-Based Proxy Re-encryption
- Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment
- Fuzzy conditional proxy re-encryption
- Public-key cryptosystems from the worst-case shortest vector problem
- Generating Shorter Bases for Hard Random Lattices
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Advances in Cryptology - CRYPTO 2003
- Classical hardness of learning with errors
- On lattices, learning with errors, random linear codes, and cryptography
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
This page was built for publication: Attribute-based conditional proxy re-encryption in the standard model under LWE