Key-Private Proxy Re-encryption under LWE
From MaRDI portal
Publication:2872038
DOI10.1007/978-3-319-03515-4_1zbMath1288.94051OpenAlexW1620415689MaRDI QIDQ2872038
Xavier Boyen, Li-hua Wang, Yoshinori Aono, Le Trieu Phong
Publication date: 14 January 2014
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-03515-4_1
Related Items (11)
Attribute-based conditional proxy re-encryption in the standard model under LWE ⋮ A Homomorphic Proxy Re-encryption from Lattices ⋮ On the asymptotic complexity of solving LWE ⋮ A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion ⋮ The direction of updatable encryption does matter ⋮ An efficient key recovery attack against NTRUReEncrypt from AsiaCCS 2015 ⋮ Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment ⋮ Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model ⋮ Universal proxy re-encryption ⋮ OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges ⋮ Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting
This page was built for publication: Key-Private Proxy Re-encryption under LWE