Development on security models for proxy re-encryption schemes
From MaRDI portal
Publication:6490031
DOI10.17654/0972555524001MaRDI QIDQ6490031
Demba Sow, Mohamed Ben Maaouia, Mamadou Makhtar Lo
Publication date: 22 April 2024
Published in: JP Journal of Algebra, Number Theory and Applications (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
- Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
- Improved proxy re-encryption schemes with applications to secure distributed storage
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A Pseudorandom Generator from any One-way Function
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: Development on security models for proxy re-encryption schemes