-
1
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)
-
(2005)
NDSS
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
33645958856
-
Certificateless public key encryption without pairing
-
Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134-148. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3650
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
5
-
-
0022716288
-
A simple unpredictable pseudo- random number generator
-
Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo- random number generator. SIAM Journal on Computing 15(2), 364-383 (1986)
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
6
-
-
84874334803
-
Improving the security of an efficient unidirectional proxy re-encryption scheme
-
Canard, S., Devigne, J., Laguillaumie, F.: Improving the security of an efficient unidirectional proxy re-encryption scheme. Journal of Internet Services and Information Security 1(2), 140- 160 (2011)
-
(2011)
Journal of Internet Services and Information Security
, vol.1
, Issue.2
, pp. 140-160
-
-
Canard, S.1
Devigne, J.2
Laguillaumie, F.3
-
8
-
-
77953505052
-
Efficient unidirectional proxy re-encryption
-
Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
-
Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316-332. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6055
, pp. 316-332
-
-
Chow, S.S.M.1
Weng, J.2
Yang, Y.3
Deng, R.H.4
-
9
-
-
58449122500
-
Chosen-ciphertext secure proxy re-encryption without pairings
-
Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
-
Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-ciphertext secure proxy re-encryption without pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5339
, pp. 1-17
-
-
Deng, R.H.1
Weng, J.2
Liu, S.3
Chen, K.4
-
10
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
11
-
-
84863280137
-
Generic construction of chosen ciphertext secure proxy re-encryption
-
Dunkelman, O. (ed.) CT-RSA 2012. Springer, Heidelberg
-
Hanaoka, G., Kawai, Y., Kunihiro, N., Matsuda, T., Weng, J., Zhang, R., Zhao, Y.: Generic construction of chosen ciphertext secure proxy re-encryption. In: Dunkelman, O. (ed.) CT-RSA 2012. stl LNCS, vol. 7178, pp. 349-364. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7178
, pp. 349-364
-
-
Hanaoka, G.1
Kawai, Y.2
Kunihiro, N.3
Matsuda, T.4
Weng, J.5
Zhang, R.6
Zhao, Y.7
-
12
-
-
80455132286
-
Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
-
Iwata, T., Nishigaki, M. (eds.) IWSEC 2011. Springer, Heidelberg
-
Hayashi, R., Matsushita, T., Yoshida, T., Fujii, Y., Okada, K.: Unforgeability of re-encryption keys against collusion attack in proxy re-encryption. In: Iwata, T., Nishigaki, M. (eds.) IWSEC 2011. LNCS, vol. 7038, pp. 210-229. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7038
, pp. 210-229
-
-
Hayashi, R.1
Matsushita, T.2
Yoshida, T.3
Fujii, Y.4
Okada, K.5
-
13
-
-
67650677267
-
Practical chosen ciphertext secure encryption from factoring
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Hofheinz, D., Kiltz, E.: Practical chosen ciphertext secure encryption from factoring. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 313-332. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 313-332
-
-
Hofheinz, D.1
Kiltz, E.2
-
14
-
-
84874289731
-
Proxy re-encryption in a stronger security model extended from CT-RSA2012
-
Dawson, E. (ed.) CT-RSA 2013. Springer, Heidelberg
-
Isshiki, T., Nguyen, M.H., Tanaka, K.: Proxy re-encryption in a stronger security model extended from CT-RSA2012. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 277-292. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7779
, pp. 277-292
-
-
Isshiki, T.1
Nguyen, M.H.2
Tanaka, K.3
-
15
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
-
Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
16
-
-
77957655174
-
CCA proxy re-encryption without bilinear maps in the standard model
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Matsuda, T., Nishimaki, R., Tanaka, K.: CCA proxy re-encryption without bilinear maps in the standard model. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 261-278. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 261-278
-
-
Matsuda, T.1
Nishimaki, R.2
Tanaka, K.3
-
17
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161-174 (1991)
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
18
-
-
38049015677
-
On the generation of cryptographically strong pseudorandom sequences
-
Shamir, A.: On the generation of cryptographically strong pseudorandom sequences. ACM Trans. Comput. Syst. 1(1) (1983)
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.1
-
-
Shamir, A.1
-
19
-
-
77957000385
-
Efficient chosen-ciphertext security via extractable hash proofs
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Wee, H.: Efficient chosen-ciphertext security via extractable hash proofs. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 314-332. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 314-332
-
-
Wee, H.1
|