-
1
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
38049024484
-
Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Bellare, M., Shoup, S.: Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 201-216. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 201-216
-
-
Bellare, M.1
Shoup, S.2
-
3
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
24144453101
-
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 87-103. Springer, Heidelberg (2005) (Pubitemid 41235422)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 87-103
-
-
Boneh, D.1
Katz, J.2
-
7
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
8
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM
-
Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 185-194. ACM (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
9
-
-
38149038713
-
Identity-based proxy re-encryption without random oracles
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
-
Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4779
, pp. 189-202
-
-
Chu, C.-K.1
Tzeng, W.-G.2
-
10
-
-
84921068281
-
On the exact security of full domain hash
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Coron, J.S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229-235. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 229-235
-
-
Coron, J.S.1
-
11
-
-
80052812186
-
An identity-based proxy re-encryption scheme with source hiding property, and its application to a mailing-list system
-
Camenisch, J., Lambrinoudakis, C. (eds.) EuroPKI 2010. Springer, Heidelberg
-
Emura, K., Miyaji, A., Omote, K.: An identity-based proxy re-encryption scheme with source hiding property, and its application to a mailing-list system. In: Camenisch, J., Lambrinoudakis, C. (eds.) EuroPKI 2010. LNCS, vol. 6711, pp. 77-92. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6711
, pp. 77-92
-
-
Emura, K.1
Miyaji, A.2
Omote, K.3
-
12
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792-807 (1986)
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
38049061546
-
Identity-based proxy re-encryption
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
14
-
-
57949106557
-
Proxy cryptography revisited
-
The Internet Society
-
Ivan, A.A., Dodis, Y.: Proxy cryptography revisited. In: NDSS. The Internet Society (2003)
-
(2003)
NDSS
-
-
Ivan, A.A.1
Dodis, Y.2
-
15
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
-
Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
16
-
-
84864644840
-
Fully secure unidirectional identity-based proxy re-encryption
-
Kim, H. (ed.) ICISC 2011. Springer, Heidelberg
-
Luo, S., Shen, Q., Chen, Z.: Fully secure unidirectional identity-based proxy re-encryption. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 109-126. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7259
, pp. 109-126
-
-
Luo, S.1
Shen, Q.2
Chen, Z.3
-
17
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
Mambo, M., Okamoto, E.: Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Transactions E80-A(1), 54-63 (1997)
-
(1997)
IEICE Transactions
, vol.E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
18
-
-
50049099260
-
Proxy re-encryption systems for identity-based encryption
-
Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
-
Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247-267. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4575
, pp. 247-267
-
-
Matsuo, T.1
-
19
-
-
78650937188
-
Secure and efficient ibe-pke proxy re-encryption
-
Mizuno, T., Doi, H.: Secure and efficient ibe-pke proxy re-encryption. IEICE Transactions 94-A(1), 36-44 (2011)
-
(2011)
IEICE Transactions
, vol.94 A
, Issue.1
, pp. 36-44
-
-
Mizuno, T.1
Doi, H.2
-
20
-
-
58549086614
-
Type-based proxy re-encryption and its construction
-
Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. Springer, Heidelberg
-
Tang, Q.: Type-based proxy re-encryption and its construction. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 130-144. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5365
, pp. 130-144
-
-
Tang, Q.1
-
21
-
-
67650109748
-
Inter-domain identity-based proxy re-encryption
-
Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. Springer, Heidelberg
-
Tang, Q., Hartel, P., Jonker, W.: Inter-domain identity-based proxy re-encryption. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 332-347. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5487
, pp. 332-347
-
-
Tang, Q.1
Hartel, P.2
Jonker, W.3
-
22
-
-
78650889838
-
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
-
Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. Springer, Heidelberg
-
Wang, L.,Wang, L., Mambo, M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 383-400. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6476
, pp. 383-400
-
-
Wang, L.1
Wang, L.2
Mambo, M.3
Okamoto, E.4
-
23
-
-
78650288030
-
New identity-based proxy re-encryption schemes to prevent collusion attacks
-
Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. Springer, Heidelberg
-
Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity-based proxy re-encryption schemes to prevent collusion attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327-346. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6487
, pp. 327-346
-
-
Wang, L.1
Wang, L.2
Mambo, M.3
Okamoto, E.4
-
24
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
25
-
-
77952320634
-
Conditional proxy re-encryption secure against chosen-ciphertext attack
-
Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ACM
-
Weng, J., Deng, R.H., Ding, X., Chu, C.K., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ASIACCS, pp. 322-332. ACM (2009)
-
(2009)
ASIACCS
, pp. 322-332
-
-
Weng, J.1
Deng, R.H.2
Ding, X.3
Chu, C.K.4
Lai, J.5
-
26
-
-
70350376239
-
Efficient conditional proxy re-encryption with chosen-ciphertext security
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
-
Weng, J., Yang, Y., Tang, Q., Deng, R.H., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 151-166. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 151-166
-
-
Weng, J.1
Yang, Y.2
Tang, Q.3
Deng, R.H.4
Bao, F.5
|