What about Bob? The inadequacy of CPA security for proxy reencryption
From MaRDI portal
Publication:2289434
DOI10.1007/978-3-030-17259-6_10zbMath1498.68051OpenAlexW2751178779MaRDI QIDQ2289434
Publication date: 28 January 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-17259-6_10
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Related Items (6)
Lattice-based HRA-secure attribute-based proxy re-encryption in standard model ⋮ Efficient attribute-based proxy re-encryption with constant size ciphertexts ⋮ Unidirectional updatable encryption and proxy re-encryption from DDH ⋮ (Inner-product) functional encryption with updatable ciphertexts ⋮ HRA-secure attribute-based threshold proxy re-encryption from lattices ⋮ Universal proxy re-encryption
This page was built for publication: What about Bob? The inadequacy of CPA security for proxy reencryption