Proxy Re-encryption with Delegatable Verifiability
From MaRDI portal
Publication:2817808
DOI10.1007/978-3-319-40367-0_8zbMath1346.94111OpenAlexW2503220868MaRDI QIDQ2817808
Publication date: 2 September 2016
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-40367-0_8
Cites Work
- Unnamed Item
- Unnamed Item
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Efficient Unidirectional Proxy Re-Encryption
- Identity-Based Proxy Re-encryption
- CCA-Secure Proxy Re-encryption without Pairings
- Key-Private Proxy Re-encryption
- Secure integration of asymmetric and symmetric encryption schemes
- Verifiable Delegation of Computation over Large Datasets
- Outsourced Pattern Matching
- Fuzzy Identity-Based Encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Type-Based Proxy Re-encryption and Its Construction
This page was built for publication: Proxy Re-encryption with Delegatable Verifiability