Unidirectional updatable encryption and proxy re-encryption from DDH
From MaRDI portal
Publication:6088988
DOI10.1007/978-3-031-31371-4_13zbMath1526.94040OpenAlexW4367593133MaRDI QIDQ6088988
Sikhar Patranabis, Peihan Miao, Gaven J. Watson
Publication date: 16 November 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-31371-4_13
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Updatable encryption with post-compromise security
- Key rotation for authenticated encryption
- Security analysis and improvements for the IETF MLS standard for group messaging
- Fast and secure updatable encryption
- Symmetric primitives with structured secrets
- Strong post-compromise secure proxy re-encryption
- What about Bob? The inadequacy of CPA security for proxy reencryption
- Adaptively secure proxy re-encryption
- Proxy re-encryption and re-signatures from lattices
- (R)CCA secure updatable encryption with integrity protection
- Efficient ratcheting: almost-optimal guarantees for secure messaging
- The direction of updatable encryption does not matter much
- Improving speed and security in updatable encryption schemes
- Updatable public key encryption in the standard model
- Key Homomorphic PRFs and Their Applications
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Trapdoors for hard lattices and new cryptographic constructions
- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
- Circular-Secure Encryption from Decision Diffie-Hellman
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Identity-Based Encryption from the Weil Pairing
- Fully homomorphic encryption using ideal lattices
- Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
- On the (im)possibility of obfuscating programs
- Proxy Re-encryption from Lattices
- Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
- Public-Key Cryptosystems Resilient to Key Leakage
- The direction of updatable encryption does matter
This page was built for publication: Unidirectional updatable encryption and proxy re-encryption from DDH