Proxy Re-encryption Systems for Identity-Based Encryption
From MaRDI portal
Publication:5429242
DOI10.1007/978-3-540-73489-5_13zbMath1151.94544OpenAlexW2159274726MaRDI QIDQ5429242
Publication date: 29 November 2007
Published in: Pairing-Based Cryptography – Pairing 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-73489-5_13
Related Items
Identity-based re-encryption scheme with lightweight re-encryption key generation ⋮ Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing ⋮ Identity-based data storage scheme with anonymous key generation in fog computing ⋮ On the security of two identity-based conditional proxy re-encryption schemes ⋮ Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security ⋮ Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts ⋮ Improved proxy re-encryption schemes with applications to secure distributed storage ⋮ Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption ⋮ Flexible attribute-based proxy re-encryption for efficient data sharing ⋮ Tracing Malicious Proxies in Proxy Re-encryption ⋮ Security vulnerability in a non-interactive ID-based proxy re-encryption scheme ⋮ Conditional Proxy Broadcast Re-Encryption ⋮ Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security ⋮ Chosen-Ciphertext Secure Proxy Re-encryption without Pairings ⋮ Type-Based Proxy Re-encryption and Its Construction ⋮ Time-and-ID-based proxy reencryption scheme
This page was built for publication: Proxy Re-encryption Systems for Identity-Based Encryption