-
1
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
EUROCRYPT 1998
-
M. Blaze, G. Bleumer, and M. Strauss. Divertible protocols and atomic proxy cryptography. In EUROCRYPT 1998, volume 1403 of LNCS, pages 127-144, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
2
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, H. Zhu, P.-H. Ho, and X. Shen. GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications. IEEE Transaction on Vehicular Technology, 56(7):3442-3456, 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6 I
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
3
-
-
51349156734
-
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. In IEEE INFOCOM 2008, 2008.
-
IEEE INFOCOM 2008, 2008
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
4
-
-
77953313061
-
SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks
-
R. Lu, X. Lin, and X. Shen. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. In IEEE INFOCOM 2010, 2010.
-
IEEE INFOCOM 2010, 2010
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
5
-
-
85180411878
-
Improved Proxy Reencryption Schemes with Applications to Secure Distributed Storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved Proxy Reencryption Schemes with Applications to Secure Distributed Storage. In Internet Society (ISOC): NDSS 2005, pages 29-43, 2005.
-
(2005)
Internet Society (ISOC): NDSS 2005
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
6
-
-
38049061546
-
Identity-Based Proxy Re-encryption
-
ACNS 2007, Full version: Cryptology ePrint Archieve: Report 2006/473
-
M. Green and G. Ateniese. Identity-Based Proxy Re-encryption. In ACNS 2007, volume 4521 of LNCS, pages 288-306, 2007. Full version: Cryptology ePrint Archieve: Report 2006/473.
-
(2007)
LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
7
-
-
77952361637
-
Chosen-Ciphertext Secure Proxy Re- Encryption
-
Full version: Cryptology ePrint Archieve: Report 2007/171
-
R. Canetti and S. Hohenberger. Chosen-Ciphertext Secure Proxy Re- Encryption. In ACM CCS 2007, 2007. Full version: Cryptology ePrint Archieve: Report 2007/171.
-
ACM CCS 2007, 2007
-
-
Canetti, R.1
Hohenberger, S.2
-
8
-
-
40249113119
-
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
-
PKC 2008
-
B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption. In PKC 2008, volume 4939 of LNCS, pages 360-379, 2008.
-
(2008)
LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
9
-
-
70349254785
-
RSA-TBOS Signcryption with Proxy Reencryption
-
V. Kirtane and C. P. Rangan. RSA-TBOS Signcryption with Proxy Reencryption. In ACM DRM 2008, pages 59-66, 2008.
-
(2008)
ACM DRM 2008
, pp. 59-66
-
-
Kirtane, V.1
Rangan, C.P.2
-
10
-
-
67049100266
-
CCA-Secure Proxy Re-Encryption without Pairings
-
PKC 2009
-
J. Shao and Z. Cao. CCA-Secure Proxy Re-Encryption without Pairings. In PKC 2009, volume 5443 of LNCS, pages 357-376, 2009.
-
(2009)
LNCS
, vol.5443
, pp. 357-376
-
-
Shao, J.1
Cao, Z.2
-
11
-
-
77953307109
-
SCCR: A generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption
-
J. Shao, Z. Cao, and P. Liu. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. SECURITY AND COMMUNICATION NETWORKS, 2009.
-
(2009)
Security and Communication Networks
-
-
Shao, J.1
Cao, Z.2
Liu, P.3
-
12
-
-
77952322019
-
CCASecure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
-
Updated version
-
J. Weng, M. Chen, Y. Yang, R.H. Deng, K. Chen, and Feng Bao. CCASecure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. Science China Information Sciences, 53(3):593-606, 2010. Updated version: http://eprint.iacr.org/2010/265.
-
(2010)
Science China Information Sciences
, vol.53
, Issue.3
, pp. 593-606
-
-
Weng, J.1
Chen, M.2
Yang, Y.3
Deng, R.H.4
Chen, K.5
Bao, F.6
-
13
-
-
67650135696
-
Key-Private Proxy Re- Encryption
-
RSA 2009
-
G. Ateniese, K. Benson, and S. Hohenberger. Key-Private Proxy Re- Encryption. In RSA 2009, volume 5473 of LNCS, pages 279-294, 2009.
-
(2009)
LNCS
, vol.5473
, pp. 279-294
-
-
Ateniese, G.1
Benson, K.2
Hohenberger, S.3
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CRYPTO 1984
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 1984, volume 196 of LNCS, pages 47-53, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
15
-
-
77957655174
-
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model
-
PKC 2010
-
T. Matsuda, R. Nishimaki, and K. Tanaka. CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model. In PKC 2010, volume 6056 of LNCS, pages 261-278, 2010.
-
(2010)
LNCS
, vol.6056
, pp. 261-278
-
-
Matsuda, T.1
Nishimaki, R.2
Tanaka, K.3
-
16
-
-
58449122500
-
Chosen- Ciphertext Secure Proxy Re-Encryption Schemes without Pairings
-
CANS 2008
-
J. Weng, R. H. Deng, S. Liu, K. Chen, J. Lai, and X. Wang. Chosen- Ciphertext Secure Proxy Re-Encryption Schemes without Pairings. In CANS 2008, volume 5339 of LNCS, pages 1-17, 2008.
-
(2008)
LNCS
, vol.5339
, pp. 1-17
-
-
Weng, J.1
Deng, R.H.2
Liu, S.3
Chen, K.4
Lai, J.5
Wang, X.6
-
17
-
-
77953505052
-
Efficient Unidirectional Proxy Re-Encryption
-
Africacrypt 2010, Full version
-
S.S.M. Chow, J. Weng, Y. Yang, and R.H. Deng. Efficient Unidirectional Proxy Re-Encryption. In Africacrypt 2010, volume 6055 of LNCS, pages 316-332, 2010. Full version: http://eprint.iacr.org/2009/189.
-
(2010)
LNCS
, vol.6055
, pp. 316-332
-
-
Chow, S.S.M.1
Weng, J.2
Yang, Y.3
Deng, R.H.4
-
18
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In ACM STOC 2009, pages 169-178, 2009.
-
(2009)
ACM STOC 2009
, pp. 169-178
-
-
Gentry, C.1
-
19
-
-
38149038713
-
Identity-based Proxy Re-encryption Without Random Oracles
-
ISC 2007
-
C. Chu and W. Tzeng. Identity-based Proxy Re-encryption Without Random Oracles. In ISC 2007, volume 4779 of LNCS, pages 189-202, 2007.
-
(2007)
LNCS
, vol.4779
, pp. 189-202
-
-
Chu, C.1
Tzeng, W.2
-
20
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
EUROCRPYT 2006
-
C. Gentry. Practical identity-based encryption without random oracles. In EUROCRPYT 2006, volume 4004 of LNCS, pages 445-464, 2006.
-
(2006)
LNCS
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
22
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
EUROCRYPT 2004
-
R. Canetti, S. Halevi, and J. Katz. Chosen-ciphertext security from identity-based encryption. In EUROCRYPT 2004, volume 3027 of LNCS, pages 207-222, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
|