-
1
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006) (Pubitemid 43909438)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
3
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
In: Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.2139, pp. 213-229. Springer, Heidelberg (2001) (Pubitemid 33317917)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
38049013826
-
An interpretation of identity-based cryptography
-
In: Aldini, A., Gorrieri, R. (eds.), Springer, Heidelberg
-
Chen, L.: An interpretation of identity-based cryptography. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol.4677, pp. 183-208. Springer, Heidelberg (2007)
-
(2007)
FOSAD 2007. LNCS
, vol.4677
, pp. 183-208
-
-
Chen, L.1
-
6
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
In: Blakely, G.R., Chaum, D. (eds.), Springer, Heidelberg
-
El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.196, pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
7
-
-
38049061546
-
Identity-based proxy re-encryption
-
In: Katz, J., Yung, M. (eds.), Springer, Heidelberg
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.4521, pp. 288-306. Springer, Heidelberg (2007)
-
(2007)
ACNS 2007. LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
9
-
-
84956869808
-
On quorum controlled asymmetric proxy re-encryption
-
In: Imai, H., Zheng, Y. (eds.), Springer, Heidelberg
-
Jakobsson, M.: On quorum controlled asymmetric proxy re-encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.1560, pp. 112-121. Springer, Heidelberg (1999)
-
(1999)
PKC 1999. LNCS
, vol.1560
, pp. 112-121
-
-
Jakobsson, M.1
-
10
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts.
-
Mambo, M., Okamoto, E.: Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences E80-A(1), 54-63 (1997)
-
(1997)
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences E80-A
, vol.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
11
-
-
50049099260
-
Proxy re-encryption systems for identity-based encryption
-
In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.), Springer, Heidelberg
-
Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol.4575, pp. 247-267. Springer, Heidelberg (2007)
-
(2007)
Pairing 2007. LNCS
, vol.4575
, pp. 247-267
-
-
Matsuo, T.1
-
12
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
In: Blakely, G.R., Chaum, D. (eds.), Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
14
-
-
67649573353
-
The us department of health and human services
-
The US Department of Health and Human Services. Summary of the HIPAA Privacy Rule (2003)
-
(2003)
Summary of the HIPAA Privacy Rule
-
-
-
15
-
-
38349010221
-
Authorization-limited transformation-free roxy cryptosystems and their security analyses
-
Wang, L., Cao, Z., Okamoto, T., Miao, Y., Okamoto, E.: Authorization-Limited Transformation-Free roxy Cryptosystems and Their Security Analyses. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (1), 106-114 (2006)
-
(2006)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.1
, pp. 106-114
-
-
Wang, L.1
Cao, Z.2
Okamoto, T.3
Miao, Y.4
Okamoto, E.5
-
16
-
-
27644532597
-
Distributed blinding for distributed elgamal re-encryption
-
IEEE Computer Society Press, Los Alamitos
-
Zhou, L., Marsh, M.A., Schneider, F.B., Redz, A.: Distributed blinding for distributed elgamal re-encryption. In: ICDCS 2005: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, p. 824. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
ICDCS 2005: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
, pp. 824
-
-
Zhou, L.1
Marsh, M.A.2
Schneider, F.B.3
Redz, A.4
|