Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
From MaRDI portal
Publication:5402966
DOI10.1007/978-3-642-54631-0_6zbMath1335.94037OpenAlexW19558663MaRDI QIDQ5402966
Feng-Hao Liu, Keita Xagawa, Ryo Nishimaki, Melissa Chase, Nishanth Chandran
Publication date: 25 March 2014
Published in: Public-Key Cryptography – PKC 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-54631-0_6
Related Items (7)
Identity-based re-encryption scheme with lightweight re-encryption key generation ⋮ Unidirectional updatable encryption and proxy re-encryption from DDH ⋮ (Inner-product) functional encryption with updatable ciphertexts ⋮ The direction of updatable encryption does matter ⋮ Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model ⋮ Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation ⋮ Universal proxy re-encryption
This page was built for publication: Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices