-
1
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese G, Fu K, Green M, Hohenberger S. Improved proxy re-encryption schemes with applications to secure distributed storage. In NDSS 2005, San Diego, California, USA. The Internet Society 2005, 2005; 29-43.
-
(2005)
NDSS 2005, San Diego, California, USA. The Internet Society 2005
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese G, Fu K, Green M, Hohenberger S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security (TISSEC) 2006; 9(1): 1-30.
-
(2006)
ACM Transactions on Information and System Security (TISSEC)
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Springer: Heidelberg
-
Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In EUROCRYPT 1998, LNCS, Vol. 1403. Springer: Heidelberg, 1998; 127-144.
-
(1998)
EUROCRYPT 1998, LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
57949106557
-
Proxy cryptography revisited
-
Ivan A, Dodis Y. Proxy cryptography revisited. In NDSS 2003, San Diego, California, USA. The Internet Society 2003, 2003; 174-193.
-
(2003)
NDSS 2003, San Diego, California, USA. The Internet Society 2003
, pp. 174-193
-
-
Ivan, A.1
Dodis, Y.2
-
5
-
-
38049061546
-
Identity-based proxy re-encryption
-
Springer: Heidelberg, Full version: Cryptology ePrint Archieve: Report 2006/473.
-
Green M, Ateniese G. Identity-based proxy re-encryption. In ACNS 2007, LNCS, Vol. 4521. Springer: Heidelberg, 2007; 288-306. Full version: Cryptology ePrint Archieve: Report 2006/473.
-
(2007)
ACNS 2007, LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
6
-
-
38049073133
-
Securely obfuscating re-encryption
-
Springer: Heidelberg
-
Hohenberger S, Rothblum G, Shelat A, Vaikuntanathan V. Securely obfuscating re-encryption. In TCC 2007, LNCS, Vol. 4392. Springer: Heidelberg, 2007; 233-252.
-
(2007)
TCC 2007, LNCS
, vol.4392
, pp. 233-252
-
-
Hohenberger, S.1
Rothblum, G.2
Shelat, A.3
Vaikuntanathan, V.4
-
7
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
ACM New York, NY, USA. Full version: Cryptology ePrint Archieve: Report 2007/171.
-
Canetti R, Hohenberger S. Chosen-ciphertext secure proxy re-encryption. In ACM CCS 2007, 2007; 185-194. ACM New York, NY, USA. Full version: Cryptology ePrint Archieve: Report 2007/171.
-
(2007)
ACM CCS 2007
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
8
-
-
77952369970
-
Chosen-ciphertext secure proxy re-encryption schemes without pairings
-
Springer: Heidelberg
-
Weng J, Deng RH, Liu S, Chen K, Lai J, Wang X. Chosen-ciphertext secure proxy re-encryption schemes without pairings. In CANS 2008, LNCS, Vol. 5339. Springer: Heidelberg, 2008; 1-17.
-
(2008)
CANS 2008, LNCS
, vol.5339
, pp. 1-17
-
-
Weng, J.1
Deng, R.H.2
Liu, S.3
Chen, K.4
Lai, J.5
Wang, X.6
-
9
-
-
67049100266
-
CCA-secure proxy re-encryption without pairings
-
Springer: Heidelberg
-
Shao J, Cao Z. CCA-secure proxy re-encryption without pairings. In PKC 2009, LNCS, Vol. 5443. Springer: Heidelberg, 2009; 357-376.
-
(2009)
PKC 2009, LNCS
, vol.5443
, pp. 357-376
-
-
Shao, J.1
Cao, Z.2
-
10
-
-
77953505052
-
Efficient unidirectional proxy re-encryption
-
Springer: Heidelberg, Full version:
-
Chow S, Weng J, Yang Y, Deng R. Efficient unidirectional proxy re-encryption. In Africacrypt 2010, LNCS, Vol. 6055. Springer: Heidelberg, 2010; 316-332. Full version:
-
(2010)
Africacrypt 2010, LNCS
, vol.6055
, pp. 316-332
-
-
Chow, S.1
Weng, J.2
Yang, Y.3
Deng, R.4
-
11
-
-
67650135696
-
Key-private proxy re-encryption
-
Springer: Heidelberg
-
Ateniese G, Benson K, Hohenberger S. Key-private proxy re-encryption. In RSA 2009, LNCS, Vol. 5473. Springer: Heidelberg, 2009; 279-294.
-
(2009)
RSA 2009, LNCS
, vol.5473
, pp. 279-294
-
-
Ateniese, G.1
Benson, K.2
Hohenberger, S.3
-
12
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Springer: Heidelberg
-
Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. In PKC 2008, LNCS, Vol. 4939. Springer: Heidelberg, 2008; 360-379.
-
(2008)
PKC 2008, LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
13
-
-
77952322019
-
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
-
Updated version:
-
Weng J, Chen M, Yang Y, Deng R, Chen K, Bao F. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Science China Information Sciences 2010; 53(3): 593- 606. Updated version:
-
(2010)
Science China Information Sciences
, vol.53
, Issue.3
, pp. 593-606
-
-
Weng, J.1
Chen, M.2
Yang, Y.3
Deng, R.4
Chen, K.5
Bao, F.6
-
14
-
-
79251541771
-
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption
-
Shao J, Cao Z, Liu P. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Security and Communication Networks 2011; 4(2): 122-135.
-
(2011)
Security and Communication Networks
, vol.4
, Issue.2
, pp. 122-135
-
-
Shao, J.1
Cao, Z.2
Liu, P.3
-
15
-
-
84947618831
-
-
CCA-secure PRE scheme without random oracles; Cryptology ePrint Archive
-
Shao J, Cao Z, Liu P. CCA-secure PRE scheme without random oracles; Cryptology ePrint Archive
-
-
-
Shao, J.1
Cao, Z.2
Liu, P.3
-
16
-
-
77957678366
-
Improved unidirectional chosen-ciphertext secure proxy re-encryption
-
Beijing, China
-
Zhao G, Fang L, Wang J, Ge C, Ren Y. Improved unidirectional chosen-ciphertext secure proxy re-encryption. In 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), Beijing, China 2010; 476-480.
-
(2010)
2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)
, pp. 476-480
-
-
Zhao, G.1
Fang, L.2
Wang, J.3
Ge, C.4
Ren, Y.5
-
17
-
-
77957256339
-
Toward CCA-secure bidirectional proxy re-encryption without pairing nor random oracle
-
V1-599-V1-602 Dalian, China
-
Zhang L, Wang XA, Wang W. Toward CCA-secure bidirectional proxy re-encryption without pairing nor random oracle. In 2nd International Conference on Signal Processing Systems (ICSPS), Dalian, China Vol. 1, 2010; V1-599-V1-602.
-
(2010)
2nd International Conference on Signal Processing Systems (ICSPS)
, vol.1
-
-
Zhang, L.1
Wang, X.A.2
Wang, W.3
-
18
-
-
78249237546
-
CCA-secure type-based proxy re-encryption with invisible proxy
-
Bradford, West Yorkshire, UK
-
Jia X, Shao J, Jing J, Liu P. CCA-secure type-based proxy re-encryption with invisible proxy. In IEEE CIT 2010, Bradford, West Yorkshire, UK, 2010; 1299-1305.
-
(2010)
IEEE CIT 2010
, pp. 1299-1305
-
-
Jia, X.1
Shao, J.2
Jing, J.3
Liu, P.4
-
20
-
-
0000537828
-
Efficient identifications and signatures for smart cards
-
Springer: Heidelberg
-
Schnorr C. Efficient identifications and signatures for smart cards. In CRYPTO 1998, LNCS, Vol. 435. Springer: Heidelberg, 1998; 239-251.
-
(1998)
CRYPTO 1998, LNCS
, vol.435
, pp. 239-251
-
-
Schnorr, C.1
-
21
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985; 31(4): 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
22
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Springer: Heidelberg
-
Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In CRYPTO 1999, LNCS, Vol. 1666. Springer: Heidelberg, 1999; 537-554.
-
(1999)
CRYPTO 1999, LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
23
-
-
84946837370
-
Key-privacy in public-key encryption
-
Springer: Heidelberg
-
Bellare M, Boldyreva A, Desai A, Pointcheval D. Key-privacy in public-key encryption. In Asiacrypt 2001, LNCS, Vol. 2248. Springer: Heidelberg, 2001; 566-582.
-
(2001)
Asiacrypt 2001, LNCS
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
24
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Springer: Heidelberg
-
Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In CRYPTO 1998, LNCS, Vol. 1462. Springer: Heidelberg, 1998; 13-25.
-
(1998)
CRYPTO 1998, LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
25
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
Claremont Resort, Berkeley, CA, USA
-
Shi E, Bethencourt J, Chan HTH, Song D, Perrig A. Multi-dimensional range query over encrypted data. In S & P 2007, Claremont Resort, Berkeley, CA, USA, 2007; 350-364.
-
(2007)
S & P 2007
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.T.H.3
Song, D.4
Perrig, A.5
-
26
-
-
38049077895
-
Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman
-
Springer: Heidelberg
-
Kiltz E. Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman. In PKC 2007, LNCS, Vol. 4450. Springer: Heidelberg, 2007; 282-297.
-
(2007)
PKC 2007, LNCS
, vol.4450
, pp. 282-297
-
-
Kiltz, E.1
-
27
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
ACM New York, NY, USA
-
Gentry C. Fully homomorphic encryption using ideal lattices. In ACM STOC 2009. ACM New York, NY, USA, 2009; 169-178.
-
(2009)
ACM STOC 2009
, pp. 169-178
-
-
Gentry, C.1
|