Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Identity-Based Proxy Re-encryption Without Random Oracles - MaRDI portal

Identity-Based Proxy Re-encryption Without Random Oracles

From MaRDI portal
Publication:3507874

DOI10.1007/978-3-540-75496-1_13zbMath1138.68404OpenAlexW1500253167MaRDI QIDQ3507874

Wen-Guey Tzeng, Cheng-Kang Chu

Publication date: 24 June 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-75496-1_13




Related Items

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oraclesHierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data SharingIdentity-based data storage scheme with anonymous key generation in fog computingOn the security of two identity-based conditional proxy re-encryption schemesSecure server-aided data sharing clique with attestationChosen-ciphertext secure bidirectional proxy re-encryption schemes without pairingsEfficient bidirectional proxy re-encryption with direct chosen-ciphertext securityA New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusionRe-encryption method designed by row complete matrixChosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertextsImproved proxy re-encryption schemes with applications to secure distributed storageFully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryptionChosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchFlexible attribute-based proxy re-encryption for efficient data sharingMulti-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryptionSecurity vulnerability in a non-interactive ID-based proxy re-encryption schemeConstant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscationConditional Proxy Broadcast Re-EncryptionEfficient Conditional Proxy Re-encryption with Chosen-Ciphertext SecurityChosen-Ciphertext Secure Proxy Re-encryption without PairingsTime-and-ID-based proxy reencryption scheme