Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption

From MaRDI portal
Publication:5445463

DOI10.1007/978-3-540-78440-1_21zbMath1162.94382OpenAlexW2102355710MaRDI QIDQ5445463

Benoît Libert, Damien Vergnaud

Publication date: 5 March 2008

Published in: Public Key Cryptography – PKC 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78440-1_21




Related Items

Identity-based re-encryption scheme with lightweight re-encryption key generationGeneric Construction of Chosen Ciphertext Secure Proxy Re-EncryptionStructure-preserving signatures and commitments to group elementsCCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oraclesLESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communicationHierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data SharingMulti-use and unidirectional identity-based proxy re-encryption schemesEfficient attribute-based proxy re-encryption with constant size ciphertextsOn the security of two identity-based conditional proxy re-encryption schemesProxy-invisible CCA-secure type-based proxy re-encryption without random oraclesAugmented Learning with Errors: The Untapped Potential of the Error TermChosen-ciphertext secure bidirectional proxy re-encryption schemes without pairingsThreshold proxy re-signatureMulti-key Homomorphic Proxy Re-EncryptionEfficient bidirectional proxy re-encryption with direct chosen-ciphertext securityA New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusionHRA-secure attribute-based threshold proxy re-encryption from latticesRe-encryption method designed by row complete matrixChosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertextsImproved proxy re-encryption schemes with applications to secure distributed storageEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesChosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchMobile access and flexible search over encrypted cloud data in heterogeneous systemsA Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast CommunicationPRE: stronger security notions and efficient construction with non-interactive openingMulti-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryptionProxy re-encryption with keyword searchTracing Malicious Proxies in Proxy Re-encryptionRe-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-EncryptionCollusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard modelEFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryptionConstant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscationA CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing systemIdentity-based proxy re-signatures from latticesKey-Private Proxy Re-encryptionProxy Re-encryption with Delegatable VerifiabilityConditional Proxy Broadcast Re-EncryptionUniversal proxy re-encryptionPublic Verifiability from Pairings in Secret Sharing SchemesUnforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-EncryptionEfficient Conditional Proxy Re-encryption with Chosen-Ciphertext SecurityChosen-Ciphertext Secure Proxy Re-encryption without PairingsTime-and-ID-based proxy reencryption schemeCompact hierarchical identity-based encryption based on a harder decisional problem



Cites Work