Identity-Based Proxy Re-encryption Without Random Oracles
From MaRDI portal
Publication:3507874
DOI10.1007/978-3-540-75496-1_13zbMath1138.68404OpenAlexW1500253167MaRDI QIDQ3507874
Wen-Guey Tzeng, Cheng-Kang Chu
Publication date: 24 June 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-75496-1_13
Related Items
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles ⋮ Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing ⋮ Identity-based data storage scheme with anonymous key generation in fog computing ⋮ On the security of two identity-based conditional proxy re-encryption schemes ⋮ Secure server-aided data sharing clique with attestation ⋮ Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings ⋮ Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security ⋮ A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion ⋮ Re-encryption method designed by row complete matrix ⋮ Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts ⋮ Improved proxy re-encryption schemes with applications to secure distributed storage ⋮ Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption ⋮ Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search ⋮ Flexible attribute-based proxy re-encryption for efficient data sharing ⋮ Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption ⋮ Security vulnerability in a non-interactive ID-based proxy re-encryption scheme ⋮ Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation ⋮ Conditional Proxy Broadcast Re-Encryption ⋮ Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security ⋮ Chosen-Ciphertext Secure Proxy Re-encryption without Pairings ⋮ Time-and-ID-based proxy reencryption scheme