Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
From MaRDI portal
Publication:5445463
DOI10.1007/978-3-540-78440-1_21zbMath1162.94382OpenAlexW2102355710MaRDI QIDQ5445463
Benoît Libert, Damien Vergnaud
Publication date: 5 March 2008
Published in: Public Key Cryptography – PKC 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78440-1_21
Related Items
Identity-based re-encryption scheme with lightweight re-encryption key generation ⋮ Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption ⋮ Structure-preserving signatures and commitments to group elements ⋮ CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles ⋮ LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication ⋮ Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing ⋮ Multi-use and unidirectional identity-based proxy re-encryption schemes ⋮ Efficient attribute-based proxy re-encryption with constant size ciphertexts ⋮ On the security of two identity-based conditional proxy re-encryption schemes ⋮ Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles ⋮ Augmented Learning with Errors: The Untapped Potential of the Error Term ⋮ Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings ⋮ Threshold proxy re-signature ⋮ Multi-key Homomorphic Proxy Re-Encryption ⋮ Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security ⋮ A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion ⋮ HRA-secure attribute-based threshold proxy re-encryption from lattices ⋮ Re-encryption method designed by row complete matrix ⋮ Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts ⋮ Improved proxy re-encryption schemes with applications to secure distributed storage ⋮ Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures ⋮ Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search ⋮ Mobile access and flexible search over encrypted cloud data in heterogeneous systems ⋮ A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication ⋮ PRE: stronger security notions and efficient construction with non-interactive opening ⋮ Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption ⋮ Proxy re-encryption with keyword search ⋮ Tracing Malicious Proxies in Proxy Re-encryption ⋮ Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption ⋮ Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model ⋮ EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption ⋮ Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation ⋮ A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system ⋮ Identity-based proxy re-signatures from lattices ⋮ Key-Private Proxy Re-encryption ⋮ Proxy Re-encryption with Delegatable Verifiability ⋮ Conditional Proxy Broadcast Re-Encryption ⋮ Universal proxy re-encryption ⋮ Public Verifiability from Pairings in Secret Sharing Schemes ⋮ Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption ⋮ Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security ⋮ Chosen-Ciphertext Secure Proxy Re-encryption without Pairings ⋮ Time-and-ID-based proxy reencryption scheme ⋮ Compact hierarchical identity-based encryption based on a harder decisional problem
Cites Work
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Identity-Based Cryptosystems and Signature Schemes
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Securely Obfuscating Re-encryption
- Identity-Based Proxy Re-encryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Advances in Cryptology - CRYPTO 2003
- Topics in Cryptology – CT-RSA 2005
- Public Key Cryptography - PKC 2005
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Theory of Cryptography
- Public Key Cryptography - PKC 2006
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item