-
1
-
-
67650135696
-
Key-Private Proxy Re-encryption
-
Fischlin,M. (ed.) CT-RSA2009. Springer, Heidelberg
-
Ateniese, G., Benson, K., Hohenberger, S.: Key-Private Proxy Re-encryption. In: Fischlin,M. (ed.) CT-RSA2009. LNCS, vol. 5473, pp. 279-294. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5473
, pp. 279-294
-
-
Ateniese, G.1
Benson, K.2
Hohenberger, S.3
-
2
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)
-
(2005)
NDSS
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
4
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACMCCS 1993, pp. 62-73. ACM Press (1993)
-
(1993)
ACMCCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
-
(1998)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
6
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Boneh, D., Boyen, X., Goh, E.J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
7
-
-
84874324906
-
Identity-Based Encryption from theWeil Pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin,M.: Identity-Based Encryption from theWeil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
84874334803
-
Improving the security of an efficient unidirectional proxy re-encryption scheme
-
Canard, S., Devigne, J., Laguillaumie, F.: Improving the security of an efficient unidirectional proxy re-encryption scheme. Journal of Internet Services and Information Security 1(2), 140- 160 (2011)
-
(2011)
Journal of Internet Services and Information Security
, vol.1
, Issue.2
, pp. 140-160
-
-
Canard, S.1
Devigne, J.2
Laguillaumie, F.3
-
9
-
-
35248897599
-
A Forward Secure Public Key Encryption Scheme
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: A Forward Secure Public Key Encryption Scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 254-271. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 254-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
11
-
-
77953505052
-
Efficient Unidirectional Proxy Re-Encryption
-
Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
-
Chow, S.S.M.,Weng, J., Yang, Y.,Deng, R.H.: Efficient Unidirectional Proxy Re-Encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316-332. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6055
, pp. 316-332
-
-
Chow, S.S.M.1
Weng, J.2
Yang, Y.3
Deng, R.H.4
-
12
-
-
58449122500
-
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
-
Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
-
Deng, R., Weng, J., Liu, S., Chen, K.: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5339
, pp. 1-17
-
-
Deng, R.1
Weng, J.2
Liu, S.3
Chen, K.4
-
13
-
-
85032883059
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
14
-
-
84863280137
-
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
-
Dunkelman, O. (ed.) CT-RSA 2012. Springer, Heidelberg
-
Hanaoka, G., Kawai, Y., Kunihiro, N., Matsuda, T., Weng, J., Zhang, R., Zhao, Y.: Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 349-364. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7178
, pp. 349-364
-
-
Hanaoka, G.1
Kawai, Y.2
Kunihiro, N.3
Matsuda, T.4
Weng, J.5
Zhang, R.6
Zhao, Y.7
-
15
-
-
57949106557
-
Proxy cryptography revisited
-
The Internet Society
-
Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: NDSS. The Internet Society (2003)
-
(2003)
NDSS
-
-
Ivan, A.1
Dodis, Y.2
-
16
-
-
38049077895
-
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Kiltz, E.: Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 282-297. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 282-297
-
-
Kiltz, E.1
-
17
-
-
77952021770
-
Efficient CCA-Secure PKE from Identity-Based Techniques
-
Pieprzyk, J. (ed.) CT-RSA 2010. Springer, Heidelberg
-
Lai, J., Deng, R.H., Liu, S., Kou, W.: Efficient CCA-Secure PKE from Identity-Based Techniques. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 132-147. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5985
, pp. 132-147
-
-
Lai, J.1
Deng, R.H.2
Liu, S.3
Kou, W.4
-
18
-
-
40249113119
-
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
-
Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
-
Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
19
-
-
84874291827
-
A CCA-secure proxy re-encryption scheme with short ciphertexts
-
Nishimaki, R.: A CCA-secure proxy re-encryption scheme with short ciphertexts. In: SCIS 2011, 3F3-2 in Japanese (2011)
-
(2011)
SCIS 2011, 3F3-2 in Japanese
-
-
Nishimaki, R.1
-
20
-
-
24944554962
-
Fuzzy Identity-Based Encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
21
-
-
84857361860
-
Achieving key privacy without losing CCA security in proxy re-encryption
-
doi:10.1016/j.jss.2011.09.034
-
Shao, J., Liu, P., Zhou, Y.: Achieving key privacy without losing CCA security in proxy re-encryption. J. Syst. Software (2011), doi:10.1016/j.jss. 2011.09.034
-
(2011)
J. Syst. Software
-
-
Shao, J.1
Liu, P.2
Zhou, Y.3
|