-
1
-
-
85180411878
-
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: NDSS 2005 (2005)
-
(2005)
NDSS 2005
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
33745218758
-
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. ACM Transactions on Information and System Security (TISSEC) 9(1), 1-30 (2006)
-
(2006)
ACM Transactions on Information and System Security (TISSEC)
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
Advances in Cryptology - CRYPTO '98
-
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998) (Pubitemid 128118995)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
4
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
5
-
-
77952361637
-
Chosen-Ciphertext Secure Proxy Re-Encryption
-
Canetti, R., Hohenberger, S.: Chosen-Ciphertext Secure Proxy Re-Encryption. In: ACM CCS 2007, pp. 185-194 (2007)
-
(2007)
ACM CCS 2007
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
6
-
-
77953505052
-
Efficient Unidirectional Proxy Re- Encryption
-
Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
-
Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient Unidirectional Proxy Re- Encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316-332. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6055
, pp. 316-332
-
-
Chow, S.S.M.1
Weng, J.2
Yang, Y.3
Deng, R.H.4
-
7
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Dodis, Y., Yampolskiy, A.: A Verifiable Random Function With Short Proofs and Keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005) (Pubitemid 41231346)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
8
-
-
80455149105
-
Non-Transferable Proxy Re- Encryption
-
He, Y.J., Chim, T.W., Hui, L.C.K., Yiu, S.M.: Non-Transferable Proxy Re- Encryption, Cryptology ePrint archive (2010), http://eprint.iacr.org/2010/192
-
(2010)
Cryptology EPrint Archive
-
-
He, Y.J.1
Chim, T.W.2
Hui, L.C.K.3
Yiu, S.M.4
-
9
-
-
52149099038
-
Tracing Malicious Proxies in Proxy Re-encryption
-
Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg
-
Libert, B., Vergnaud, D.: Tracing Malicious Proxies in Proxy Re-encryption. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 332-353. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5209
, pp. 332-353
-
-
Libert, B.1
Vergnaud, D.2
-
10
-
-
40249113119
-
Unidirectional Chosen-Ciphertext Secure Proxy Re- Encryption
-
Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
-
Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re- Encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
11
-
-
0036475666
-
A New Traitor Tracing
-
Mitsunari, S., Sakai, R., Kasahara, M.: A New Traitor Tracing. IEICE Transactions E85-A(2), 481-484 (2002)
-
(2002)
IEICE Transactions
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Mitsunari, S.1
Sakai, R.2
Kasahara, M.3
-
12
-
-
67049100266
-
CCA-Secure Proxy Re-Encryption without Pairings
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Shao, J., Cao, Z.: CCA-Secure Proxy Re-Encryption without Pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 357-376. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 357-376
-
-
Shao, J.1
Cao, Z.2
-
13
-
-
78651327986
-
CCA-Secure PRE Scheme without Random Oracles
-
Shao, J., Cao, Z., Liu, P.: CCA-Secure PRE Scheme without Random Oracles, Cryptology ePrint archive (2010), http://eprint.iacr.org/2010/112
-
(2010)
Cryptology EPrint Archive
-
-
Shao, J.1
Cao, Z.2
Liu, P.3
-
14
-
-
77954643898
-
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
-
De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. Springer, Heidelberg
-
Sur, C., Jung, C.D., Park, Y., Rhee, K.H.: Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption. In: De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 214-232. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6109
, pp. 214-232
-
-
Sur, C.1
Jung, C.D.2
Park, Y.3
Rhee, K.H.4
-
15
-
-
78650288030
-
New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks
-
Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. Springer, Heidelberg
-
Wang, L., Wang, L., Mambo, M., Okamoto, E.: New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327-346. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6487
, pp. 327-346
-
-
Wang, L.1
Wang, L.2
Mambo, M.3
Okamoto, E.4
-
16
-
-
79951651905
-
New CCA-secure Proxy Re-encryption Scheme without Random Oracles
-
Wang, X.A., Wei, P., Zhang, M.: New CCA-secure Proxy Re-encryption Scheme without Random Oracles. In: CIS 2010, pp. 377-381 (2010)
-
(2010)
CIS 2010
, pp. 377-381
-
-
Wang, X.A.1
Wei, P.2
Zhang, M.3
|