-
1
-
-
67650135696
-
Key-private proxy re-encryption
-
Fischlin, M. (ed. Springer, Heidelberg (
-
Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 279-294. Springer, Heidelberg (2009)
-
(2009)
CT-RSA 2009 LNCS
, vol.5473
, pp. 279-294
-
-
Ateniese, G.1
Benson, K.2
Hohenberger, S.3
-
2
-
-
34547442110
-
-
Internet Society (ISOC): NDSS 2005
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Internet Society (ISOC): NDSS 2005, pp. 29-43 (2005)
-
(2005)
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K. (ed Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
Eurocrypt 1998 LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Franklin, M. (ed. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443-459. Springer, Heidelberg (2004)
-
(2004)
Crypto 2004 LNCS
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
Crypto 2001 LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Cachin, C., Camenisch, J.L. (eds. Springer Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
Eurocrypt 2004 LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
7
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
ACM New York
-
Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: CCS 2007, pp. 185-194. ACM, New York (2007)
-
(2007)
CCS 2007
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
8
-
-
38149038713
-
Identity-based proxy re-encryption without random oracles
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds. Springer, Heidelberg
-
Chu, C., Tzeng, W.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
-
(2007)
ISC 2007 LNCS
, vol.4779
, pp. 189-202
-
-
Chu, C.1
Tzeng, W.2
-
9
-
-
58449122500
-
Chosen-ciphertext secure proxy reencryption without pairings
-
Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds Springer, Heidelberg
-
Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-ciphertext secure proxy reencryption without pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
-
(2008)
CANS 2008 LNCS
, vol.5339
, pp. 1-17
-
-
Deng, R.H.1
Weng, J.2
Liu, S.3
Chen, K.4
-
10
-
-
38049061546
-
Identity-based proxy re-encryption
-
Katz, J., Yung, M. (eds Springer, Heidelberg
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
-
(2007)
ACNS 2007 LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
11
-
-
77956137294
-
Cryptographic cloud storage
-
Sion, R., Curtmola, R.,Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds. LNCS Springer, Heidelberg
-
Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R.,Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136-149. Springer, Heidelberg (2010)
-
(2010)
RLCPS WECSR and WLC 2010
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
12
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy reencryption
-
Cramer, R. (ed. Springer Heidelberg
-
Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy reencryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
-
(2008)
PKC 2008 LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
13
-
-
52149099038
-
Tracing malicious proxies in proxy re-encryption
-
Galbraith, S.D., Paterson, K.G. (eds. Springer Heidelberg
-
Libert, B., Vergnaud, D.: Tracing malicious proxies in proxy re-encryption. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 332- 353. Springer, Heidelberg (2008)
-
(2008)
Pairing 2008 LNCS
, vol.5209
, pp. 332-353
-
-
Libert, B.1
Vergnaud, D.2
-
14
-
-
50049099260
-
Proxy re-encryption systems for identity-based encryption
-
Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds Springer Heidelberg
-
Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247-267. Springer, Heidelberg (2007)
-
(2007)
Pairing 2007 LNCS
, vol.4575
, pp. 247-267
-
-
Matsuo, T.1
-
16
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds Springer Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984 LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
67049100266
-
CCA-secure proxy re-encryption without pairings
-
Jarecki, S., Tsudik, G. (eds. Springer Heidelberg
-
Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 357-376. Springer, Heidelberg (2009)
-
(2009)
PKC 2009 LNCS
, vol.5443
, pp. 357-376
-
-
Shao, J.1
Cao, Z.2
-
18
-
-
67650109748
-
Inter-domain identity-based proxy reencryption
-
Yung, M., Liu, P., Lin, D. (eds Springer, Heidelberg
-
Tang, Q., Hartel, P.H., Jonker, W.: Inter-domain identity-based proxy reencryption. In: Yung, M., Liu, P., Lin, D. (eds.) INSCRYPT 2008. LNCS, vol. 5487, pp. 332-347. Springer, Heidelberg (2008)
-
(2008)
Inscrypt 2008 LNCS
, vol.5487
, pp. 332-347
-
-
Tang, Q.1
Hartel, P.H.2
Jonker, W.3
-
19
-
-
77953310709
-
Achieving secure scalable and fine-grained data access control in cloud computing
-
IEEE Los Alamitos
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: InfoCom 2010, pp. 534-542. IEEE, Los Alamitos (2010)
-
(2010)
InfoCom 2010
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|