Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption
From MaRDI portal
Publication:2790055
DOI10.1007/978-3-319-16715-2_22zbMath1382.94149OpenAlexW2211454349MaRDI QIDQ2790055
Yutaka Kawai, Takahiro Matsuda, Kanta Matsuura, Goichiro Hanaoka, Satsuya Ohata
Publication date: 2 March 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16715-2_22
Cites Work
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
- On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security
- Efficient Unidirectional Proxy Re-Encryption
- CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model
- CCA-Secure Proxy Re-encryption without Pairings
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012
- More Constructions of Re-splittable Threshold Public Key Encryption
- Proxy Re-encryption from Lattices
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
This page was built for publication: Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption