Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network
暂无分享,去创建一个
Hui Guo | Jing Xu | Zhenfeng Zhang | Mingyuan Xia | Zhenfeng Zhang | Hui Guo | Jing Xu | Mingyuan Xia
[1] Hui Guo,et al. Accountable Proxy Re-Encryption for Secure Data Sharing , 2018, IEEE Transactions on Dependable and Secure Computing.
[2] Daniel Slamanig,et al. Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications , 2018, Public Key Cryptography.
[3] Brent Waters,et al. Black-box accountable authority identity-based encryption , 2008, CCS.
[4] Xiaolei Dong,et al. Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud , 2015, ESORICS.
[5] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[6] Georg Fuchsbauer,et al. Adaptively Secure Proxy Re-encryption , 2019, IACR Cryptol. ePrint Arch..
[7] Hui Guo,et al. Proxy Re-encryption with Unforgeable Re-encryption Keys , 2014, CANS.
[8] Zhenfeng Zhang,et al. PRE: Stronger security notions and efficient construction with non-interactive opening , 2014, Theor. Comput. Sci..
[9] Jing Xu,et al. Non-Transferable Proxy Re-Encryption , 2018, IACR Cryptol. ePrint Arch..
[10] Hui Guo,et al. Towards Secure Data Distribution Systems in Mobile Cloud Computing , 2017, IEEE Transactions on Mobile Computing.
[11] Benoît Libert,et al. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys , 2008, Public Key Cryptography.
[12] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[13] Aloni Cohen. What about Bob? The Inadequacy of CPA Security for Proxy Reencryption , 2017, IACR Cryptol. ePrint Arch..
[14] Qiang Tang,et al. Type-Based Proxy Re-encryption and Its Construction , 2008, INDOCRYPT.
[15] Vinod Vaikuntanathan,et al. Functional Re-encryption and Collusion-Resistant Obfuscation , 2012, TCC.
[16] Benoît Libert,et al. Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.
[17] Amit Sahai,et al. Fully Secure Accountable-Authority Identity-Based Encryption , 2011, Public Key Cryptography.
[18] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption , 2008, Public Key Cryptography.
[19] Aggelos Kiayias,et al. Making Any Identity-Based Encryption Accountable, Efficiently , 2015, ESORICS.
[20] Cristian Borcea,et al. PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption , 2017, Future Gener. Comput. Syst..
[21] Abhi Shelat,et al. Securely Obfuscating Re-encryption , 2007, TCC.
[22] Vipul Goyal,et al. Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.
[23] Serdar Pehlivanoglu,et al. An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking , 2013, IH&MMSec '13.
[24] Jin Li,et al. Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures , 2016, ACISP.
[25] Steven Myers,et al. Practical Revocation and Key Rotation , 2018, CT-RSA.
[26] Alvaro A. Cárdenas,et al. Towards a secure and interoperable DRM architecture , 2006, DRM '06.
[27] Feng-Hao Liu,et al. Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices , 2014, Public Key Cryptography.
[28] Moni Naor,et al. Traitor tracing with constant size ciphertext , 2008, CCS.
[29] Birgit Pfitzmann,et al. Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.
[30] Yunlei Zhao,et al. Accountable Authority Identity-Based Encryption with Public Traceability , 2013, CT-RSA.
[31] Hai Jin,et al. Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds , 2016, AsiaCCS.
[32] Robert H. Deng,et al. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles , 2010, Science China Information Sciences.
[33] Junzuo Lai,et al. Making Any Attribute-Based Encryption Accountable, Efficiently , 2018, ESORICS.
[34] Nigel P. Smart,et al. Identity-Based Encryption Gone Wild , 2006, ICALP.
[35] Steven Myers,et al. Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation , 2017, IACR Cryptol. ePrint Arch..
[36] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[37] Yun Ling,et al. Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage , 2018, IEEE Transactions on Information Forensics and Security.
[38] Koji Okada,et al. Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption , 2011, IWSEC.