New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks
From MaRDI portal
Publication:3059661
DOI10.1007/978-3-642-17455-1_21zbMath1252.94100OpenAlexW1557375247MaRDI QIDQ3059661
Eiji Okamoto, Masahiro Mambo, Li-hua Wang, Li-Cheng Wang
Publication date: 26 November 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17455-1_21
Related Items (6)
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing ⋮ Identity-based data storage scheme with anonymous key generation in fog computing ⋮ On the security of two identity-based conditional proxy re-encryption schemes ⋮ Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts ⋮ Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption ⋮ Time-and-ID-based proxy reencryption scheme
This page was built for publication: New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks