Tracing Malicious Proxies in Proxy Re-encryption
From MaRDI portal
Publication:3600514
DOI10.1007/978-3-540-85538-5_22zbMath1186.94458OpenAlexW1755945123MaRDI QIDQ3600514
Benoît Libert, Damien Vergnaud
Publication date: 10 February 2009
Published in: Pairing-Based Cryptography – Pairing 2008 (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/inria-00327353/file/pairing08.pdf
Related Items (8)
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings ⋮ Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security ⋮ Improved proxy re-encryption schemes with applications to secure distributed storage ⋮ Mobile access and flexible search over encrypted cloud data in heterogeneous systems ⋮ Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation ⋮ Conditional Proxy Broadcast Re-Encryption ⋮ Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption ⋮ Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Identity-Based Cryptosystems and Signature Schemes
- About the Security of MTI/C0 and MQV
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Identity-Based Encryption Gone Wild
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Securely Obfuscating Re-encryption
- Identity-Based Proxy Re-encryption
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Compact E-Cash
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Pairing-Friendly Elliptic Curves of Prime Order
- Proxy Re-encryption Systems for Identity-Based Encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Identity-Based Traitor Tracing
- Optimal probabilistic fingerprint codes
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Tracing Malicious Proxies in Proxy Re-encryption