Key-Private Proxy Re-encryption
From MaRDI portal
Publication:3623052
DOI10.1007/978-3-642-00862-7_19zbMath1237.94046OpenAlexW1517738348MaRDI QIDQ3623052
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
Publication date: 29 April 2009
Published in: Topics in Cryptology – CT-RSA 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00862-7_19
Related Items (13)
Identity-based re-encryption scheme with lightweight re-encryption key generation ⋮ Multi-use and unidirectional identity-based proxy re-encryption schemes ⋮ Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security ⋮ A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion ⋮ Re-encryption method designed by row complete matrix ⋮ PRE: stronger security notions and efficient construction with non-interactive opening ⋮ EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption ⋮ Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation ⋮ Key-Private Proxy Re-encryption ⋮ Proxy Re-encryption with Delegatable Verifiability ⋮ Universal proxy re-encryption ⋮ OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges ⋮ Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Securely Obfuscating Re-encryption
- Key-Private Proxy Re-encryption
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology – CRYPTO 2004
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
This page was built for publication: Key-Private Proxy Re-encryption