-
1
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
3
-
-
35048881545
-
The knowledge-of-exponent assumptions and 3-round zeroknowledge protocols
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Bellare, M., Palacio, A.: The knowledge-of-exponent assumptions and 3-round zeroknowledge protocols. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 273-289. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 273-289
-
-
Bellare, M.1
Palacio, A.2
-
5
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
6
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
7
-
-
45749087352
-
-
Borisov, N., Mitra, S.: Restricted queries over an encrypted index with applications to regulatory compliance. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, 5037, pp. 373-391. Springer, Heidelberg (2008)
-
Borisov, N., Mitra, S.: Restricted queries over an encrypted index with applications to regulatory compliance. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 373-391. Springer, Heidelberg (2008)
-
-
-
-
8
-
-
24944435537
-
Compact E-Cash
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact E-Cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
9
-
-
85029541173
-
Towards practical public key systems secure against chosen ciphertext attacks
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Damgård, I.: Towards practical public key systems secure against chosen ciphertext attacks. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 445-456. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 445-456
-
-
Damgård, I.1
-
10
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
ElGamal, T.1
-
11
-
-
38049061546
-
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 288-306. Springer, Heidelberg (2007)
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
-
-
-
-
12
-
-
0003442756
-
-
Cambridge University Press, Cambridge
-
Seroussi, G., Blake, I.F., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)
-
(1999)
Elliptic Curves in Cryptography
-
-
Seroussi, G.1
Blake, I.F.2
Smart, N.P.3
-
14
-
-
84956869808
-
-
Jakobsson, M.: On quorum controlled asymmetric proxy re-encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, 1560, pp. 112-121. Springer, Heidelberg (1999)
-
Jakobsson, M.: On quorum controlled asymmetric proxy re-encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 112-121. Springer, Heidelberg (1999)
-
-
-
-
15
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
Mambo, M., Okamoto, E.: Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences E80-A(1), 54-63 (1997)
-
(1997)
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
16
-
-
50049099260
-
-
Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, 4575, pp. 247-267. Springer, Heidelberg (2007)
-
Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247-267. Springer, Heidelberg (2007)
-
-
-
-
17
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
18
-
-
79951618220
-
Type-based proxy re-encryption and its construction
-
Technical Report TR-CTIT-08-47, Centre for Telematics and Information Technology, University of Twente
-
Tang, Q.: Type-based proxy re-encryption and its construction. Technical Report TR-CTIT-08-47, Centre for Telematics and Information Technology, University of Twente (2008)
-
(2008)
-
-
Tang, Q.1
-
19
-
-
38349010221
-
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses*
-
Wang, L., Cao, Z., Okamoto, T., Miao, Y., Okamoto, E.: Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses*. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (1), 106-114 (2006)
-
(2006)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.1
, pp. 106-114
-
-
Wang, L.1
Cao, Z.2
Okamoto, T.3
Miao, Y.4
Okamoto, E.5
-
20
-
-
27644532597
-
Distributed blinding for distributed elgamal re-encryption
-
IEEE Computer Society, Los Alamitos
-
Zhou, L., Marsh, M.A., Schneider, F.B., Redz, A.: Distributed blinding for distributed elgamal re-encryption. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pp. 824-824. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
, pp. 824-824
-
-
Zhou, L.1
Marsh, M.A.2
Schneider, F.B.3
Redz, A.4
|