-
1
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese G., Fu K., Green M., Hohenberger S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 2006, 9(1):1-30.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
38049024484
-
Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles
-
Springer, T. Okamoto, X. Wang (Eds.) Public Key Cryptography
-
Bellare M., Shoup S. Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles. Lect. Notes Comput. Sci. 2007, vol. 4450:201-216. Springer. T. Okamoto, X. Wang (Eds.).
-
(2007)
Lect. Notes Comput. Sci.
, vol.4450
, pp. 201-216
-
-
Bellare, M.1
Shoup, S.2
-
3
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Springer, K. Nyberg (Ed.)
-
Blaze M., Bleumer G., Strauss M. Divertible protocols and atomic proxy cryptography. Lect. Notes Comput. Sci. 1998, vol. 1403:127-144. Springer. K. Nyberg (Ed.).
-
(1998)
Lect. Notes Comput. Sci.
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Springer, R. Cramer (Ed.)
-
Boneh D., Boyen X., Goh E.-J. Hierarchical identity based encryption with constant size ciphertext. Lect. Notes Comput. Sci. 2005, vol. 3494:440-456. Springer. R. Cramer (Ed.).
-
(2005)
Lect. Notes Comput. Sci.
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
5
-
-
33745854208
-
Chosen-ciphertext security from identity-based encryption
-
Boneh D., Canetti R., Halevi S., Katz J. Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 2007, 36(5):1301-1328.
-
(2007)
SIAM J. Comput.
, vol.36
, Issue.5
, pp. 1301-1328
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
6
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh D., Franklin M.K. Identity-based encryption from the weil pairing. SIAM J. Comput. 2003, 32(3):586-615.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
7
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
ACM, New York, NY, USA
-
Canetti R., Hohenberger S. Chosen-ciphertext secure proxy re-encryption. Proceedings of the 14th ACM Conference on Computer and Communications Security 2007, 185-194. ACM, New York, NY, USA.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
8
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
Springer, D. Boneh (Ed.)
-
Canetti R., Krawczyk H., Nielsen J.B. Relaxing chosen-ciphertext security. Lect. Notes Comput. Sci. 2003, vol. 2729:565-582. Springer. D. Boneh (Ed.).
-
(2003)
Lect. Notes Comput. Sci.
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
9
-
-
38149038713
-
Identity-based proxy re-encryption without random oracles
-
Springer, J.A. Garay, A.K. Lenstra, M. Mambo, R. Peralta (Eds.)
-
Chu C.-K., Tzeng W.-G. Identity-based proxy re-encryption without random oracles. Lect. Notes Comput. Sci. 2007, vol. 4779:189-202. Springer. J.A. Garay, A.K. Lenstra, M. Mambo, R. Peralta (Eds.).
-
(2007)
Lect. Notes Comput. Sci.
, vol.4779
, pp. 189-202
-
-
Chu, C.-K.1
Tzeng, W.-G.2
-
10
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer R., Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 2003, 33(1):167-226.
-
(2003)
SIAM J. Comput.
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
11
-
-
58449122500
-
Chosen-ciphertext secure proxy re-encryption without pairings
-
Springer, M.K. Franklin, L.C.K. Hui, D.S. Wong (Eds.)
-
Deng R.H., Weng J., Liu S., Chen K. Chosen-ciphertext secure proxy re-encryption without pairings. Lect. Notes Comput. Sci. 2008, vol. 5339:1-17. Springer. M.K. Franklin, L.C.K. Hui, D.S. Wong (Eds.).
-
(2008)
Lect. Notes Comput. Sci.
, vol.5339
, pp. 1-17
-
-
Deng, R.H.1
Weng, J.2
Liu, S.3
Chen, K.4
-
12
-
-
78249251589
-
Anonymous conditional proxy re-encryption without random oracle
-
Springer, J. Pieprzyk, F. Zhang (Eds.)
-
Fang L., Susilo W., Wang J. Anonymous conditional proxy re-encryption without random oracle. Lect. Notes Comput. Sci. 2009, vol. 5848:47-60. Springer. J. Pieprzyk, F. Zhang (Eds.).
-
(2009)
Lect. Notes Comput. Sci.
, vol.5848
, pp. 47-60
-
-
Fang, L.1
Susilo, W.2
Wang, J.3
-
13
-
-
0022793132
-
How to construct random functions
-
Goldreich O., Goldwasser S., Micali S. How to construct random functions. J. ACM 1986, 33(4):792-807.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
14
-
-
38049061546
-
Identity-based proxy re-encryption
-
Springer, J. Katz, M. Yung (Eds.)
-
Green M., Ateniese G. Identity-based proxy re-encryption. Lect. Notes Comput. Sci. 2007, vol. 4521:288-306. Springer. J. Katz, M. Yung (Eds.).
-
(2007)
Lect. Notes Comput. Sci.
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
15
-
-
84863280137
-
Generic construction of chosen ciphertext secure proxy re-encryption
-
Springer, O. Dunkelman (Ed.)
-
Hanaoka G., Kawai Y., Kunihiro N., Matsuda T., Weng J., Zhang R., Zhao Y. Generic construction of chosen ciphertext secure proxy re-encryption. Lect. Notes Comput. Sci. 2012, vol. 7178:349-364. Springer. O. Dunkelman (Ed.).
-
(2012)
Lect. Notes Comput. Sci.
, vol.7178
, pp. 349-364
-
-
Hanaoka, G.1
Kawai, Y.2
Kunihiro, N.3
Matsuda, T.4
Weng, J.5
Zhang, R.6
Zhao, Y.7
-
16
-
-
84874289731
-
Proxy re-encryption in a stronger security model extended from CT-RSA 2012
-
Springer
-
Isshiki T., Nguyen M.H., Tanaka K. Proxy re-encryption in a stronger security model extended from CT-RSA 2012. Lect. Notes Comput. Sci. 2013, vol. 7779:277-292. Springer.
-
(2013)
Lect. Notes Comput. Sci.
, vol.7779
, pp. 277-292
-
-
Isshiki, T.1
Nguyen, M.H.2
Tanaka, K.3
-
17
-
-
84890956841
-
Factoring-based proxy re-encryption schemes
-
Springer, W. Susilo, R. Reyhanitabar (Eds.)
-
Isshiki T., Nguyen M.H., Tanaka K. Factoring-based proxy re-encryption schemes. Lect. Notes Comput. Sci. 2013, vol. 8209:309-329. Springer. W. Susilo, R. Reyhanitabar (Eds.).
-
(2013)
Lect. Notes Comput. Sci.
, vol.8209
, pp. 309-329
-
-
Isshiki, T.1
Nguyen, M.H.2
Tanaka, K.3
-
18
-
-
57949106557
-
Proxy cryptography revisited
-
The Internet Society
-
Ivan A.-A., Dodis Y. Proxy cryptography revisited. NDSS 2003, The Internet Society.
-
(2003)
NDSS
-
-
Ivan, A.-A.1
Dodis, Y.2
-
19
-
-
84875985547
-
A CCA-secure identity-based conditional proxy re-encryption without random oracles
-
Springer, Proceedings of the 15th ICISC
-
Liang K., Liu Z., Tan X., Wong D.S., Tang C. A CCA-secure identity-based conditional proxy re-encryption without random oracles. Lect. Notes Comput. Sci. 2013, vol. 7839:231-246. Springer.
-
(2013)
Lect. Notes Comput. Sci.
, vol.7839
, pp. 231-246
-
-
Liang, K.1
Liu, Z.2
Tan, X.3
Wong, D.S.4
Tang, C.5
-
20
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Springer, R. Cramer (Ed.)
-
Libert B., Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. Lect. Notes Comput. Sci. 2008, vol. 4939:360-379. Springer. R. Cramer (Ed.).
-
(2008)
Lect. Notes Comput. Sci.
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
21
-
-
84864644840
-
Fully secure unidirectional identity-based proxy re-encryption
-
Springer, Heidelberg, H. Kim (Ed.)
-
Luo S., Shen Q., Chen Z. Fully secure unidirectional identity-based proxy re-encryption. Lect. Notes Comput. Sci. 2011, vol. 7259:109-126. Springer, Heidelberg. H. Kim (Ed.).
-
(2011)
Lect. Notes Comput. Sci.
, vol.7259
, pp. 109-126
-
-
Luo, S.1
Shen, Q.2
Chen, Z.3
-
22
-
-
0030687206
-
Proxy cryptosystems: delegation of the power to decrypt ciphertexts
-
Mambo M., Okamoto E. Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Trans. 1997, E80-A(1):54-63.
-
(1997)
IEICE Trans.
, vol.E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
23
-
-
77957655174
-
CCA proxy re-encryption without bilinear maps in the standard model
-
Springer, P.Q. Nguyen, D. Pointcheval (Eds.)
-
Matsuda T., Nishimaki R., Tanaka K. CCA proxy re-encryption without bilinear maps in the standard model. Lect. Notes Comput. Sci. 2010, vol. 6056:261-278. Springer. P.Q. Nguyen, D. Pointcheval (Eds.).
-
(2010)
Lect. Notes Comput. Sci.
, vol.6056
, pp. 261-278
-
-
Matsuda, T.1
Nishimaki, R.2
Tanaka, K.3
-
24
-
-
50049099260
-
Proxy re-encryption systems for identity-based encryption
-
Springer, T. Takagi, T. Okamoto, E. Okamoto, T. Okamoto (Eds.)
-
Matsuo T. Proxy re-encryption systems for identity-based encryption. Lect. Notes Comput. Sci. 2007, vol. 4575:247-267. Springer. T. Takagi, T. Okamoto, E. Okamoto, T. Okamoto (Eds.).
-
(2007)
Lect. Notes Comput. Sci.
, vol.4575
, pp. 247-267
-
-
Matsuo, T.1
-
25
-
-
78650937188
-
Secure and efficient IBE-PKE proxy re-encryption
-
Mizuno T., Doi H. Secure and efficient IBE-PKE proxy re-encryption. IEICE Trans. 2011, 94-A(1):36-44.
-
(2011)
IEICE Trans.
, Issue.1
, pp. 36-44
-
-
Mizuno, T.1
Doi, H.2
-
26
-
-
24944554962
-
Fuzzy identity-based encryption
-
Springer, R. Cramer (Ed.)
-
Sahai A., Waters B. Fuzzy identity-based encryption. Lect. Notes Comput. Sci. 2005, vol. 3494:457-473. Springer. R. Cramer (Ed.).
-
(2005)
Lect. Notes Comput. Sci.
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
27
-
-
84861582429
-
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
-
Shao J., Cao Z. Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Inf. Sci. 2012, 206(0):83-95.
-
(2012)
Inf. Sci.
, vol.206
, Issue.0
, pp. 83-95
-
-
Shao, J.1
Cao, Z.2
-
28
-
-
58549086614
-
Type-based proxy re-encryption and its construction
-
Springer, D.R. Chowdhury, V. Rijmen, A. Das (Eds.)
-
Tang Q. Type-based proxy re-encryption and its construction. Lect. Notes Comput. Sci. 2008, vol. 5365:130-144. Springer. D.R. Chowdhury, V. Rijmen, A. Das (Eds.).
-
(2008)
Lect. Notes Comput. Sci.
, vol.5365
, pp. 130-144
-
-
Tang, Q.1
-
29
-
-
67650109748
-
Inter-domain identity-based proxy re-encryption
-
Springer, M. Yung, P. Liu, D. Lin (Eds.)
-
Tang Q., Hartel P.H., Jonker W. Inter-domain identity-based proxy re-encryption. Lect. Notes Comput. Sci. 2008, vol. 5487:332-347. Springer. M. Yung, P. Liu, D. Lin (Eds.).
-
(2008)
Lect. Notes Comput. Sci.
, vol.5487
, pp. 332-347
-
-
Tang, Q.1
Hartel, P.H.2
Jonker, W.3
-
30
-
-
77958151362
-
Multi-use and unidirectional identity-based proxy re-encryption schemes
-
Wang H., Cao Z., Wang L. Multi-use and unidirectional identity-based proxy re-encryption schemes. Inf. Sci. 2010, 180(20):4042-4059.
-
(2010)
Inf. Sci.
, vol.180
, Issue.20
, pp. 4042-4059
-
-
Wang, H.1
Cao, Z.2
Wang, L.3
-
31
-
-
84855307392
-
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
-
Wang L., Wang L., Mambo M., Okamoto E. Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. IEICE Trans. 2012, 95-A(1):70-88.
-
(2012)
IEICE Trans.
, Issue.1
, pp. 70-88
-
-
Wang, L.1
Wang, L.2
Mambo, M.3
Okamoto, E.4
-
32
-
-
78650288030
-
New identity-based proxy re-encryption schemes to prevent collusion attacks
-
M. Joye, A. Miyaji, A. Otsuka (Eds.)
-
Wang L., Wang L., Mambo M., Okamoto E. New identity-based proxy re-encryption schemes to prevent collusion attacks. Lect. Notes Comput. Sci. 2010, vol. 6487:327-346. M. Joye, A. Miyaji, A. Otsuka (Eds.).
-
(2010)
Lect. Notes Comput. Sci.
, vol.6487
, pp. 327-346
-
-
Wang, L.1
Wang, L.2
Mambo, M.3
Okamoto, E.4
-
33
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Springer, R. Cramer (Ed.)
-
Waters B. Efficient identity-based encryption without random oracles. Lect. Notes Comput. Sci. 2005, vol. 3494:114-127. Springer. R. Cramer (Ed.).
-
(2005)
Lect. Notes Comput. Sci.
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
34
-
-
70350345210
-
Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions
-
Springer, S. Halevi (Ed.)
-
Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. Lect. Notes Comput. Sci. 2009, vol. 5677:619-636. Springer. S. Halevi (Ed.).
-
(2009)
Lect. Notes Comput. Sci.
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
35
-
-
77952322019
-
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
-
Weng J., Chen M., Yang Y., Deng R.H., Chen K., Bao F. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 2010, 53(3):593-606.
-
(2010)
Sci. China Inf. Sci.
, vol.53
, Issue.3
, pp. 593-606
-
-
Weng, J.1
Chen, M.2
Yang, Y.3
Deng, R.H.4
Chen, K.5
Bao, F.6
-
36
-
-
79952516416
-
On the security of a bidirectional proxy re-encryption scheme from PKC 2010
-
Springer, D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi (Eds.)
-
Weng J., Zhao Y., Hanaoka G. On the security of a bidirectional proxy re-encryption scheme from PKC 2010. Lect. Notes Comput. Sci. 2011, vol. 6571:284-295. Springer. D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi (Eds.).
-
(2011)
Lect. Notes Comput. Sci.
, vol.6571
, pp. 284-295
-
-
Weng, J.1
Zhao, Y.2
Hanaoka, G.3
-
37
-
-
70350376239
-
Efficient conditional proxy re-encryption with chosen-ciphertext security
-
Springer, P. Samarati, M. Yung, F. Martinelli, C.A. Ardagna (Eds.)
-
Weng J., Yang Y., Tang Q., Deng R.H., Bao F. Efficient conditional proxy re-encryption with chosen-ciphertext security. Lect. Notes Comput. Sci. 2009, vol. 5735:151-166. Springer. P. Samarati, M. Yung, F. Martinelli, C.A. Ardagna (Eds.).
-
(2009)
Lect. Notes Comput. Sci.
, vol.5735
, pp. 151-166
-
-
Weng, J.1
Yang, Y.2
Tang, Q.3
Deng, R.H.4
Bao, F.5
-
38
-
-
77952320634
-
Conditional proxy re-encryption secure against chosen-ciphertext attack
-
ACM, W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, V. Varadharajan (Eds.)
-
Weng J., Deng R.H., Ding X., Chu C.-K., Lai J. Conditional proxy re-encryption secure against chosen-ciphertext attack. ASIACCS 2009, 322-332. ACM. W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, V. Varadharajan (Eds.).
-
(2009)
ASIACCS
, pp. 322-332
-
-
Weng, J.1
Deng, R.H.2
Ding, X.3
Chu, C.-K.4
Lai, J.5
|