Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
暂无分享,去创建一个
Julien Devigne | Fabien Laguillaumie | Eleonora Guerrini | Fabien Laguillaumie | Julien Devigne | Eleonora Guerrini
[1] Mihir Bellare,et al. Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme , 2009, EUROCRYPT.
[2] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[3] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[4] Sébastien Canard,et al. Improving the Security of an Efficient Unidirectional Proxy Re-Encryption Scheme , 2011, J. Internet Serv. Inf. Secur..
[5] Susan Hohenberger,et al. Key-Private Proxy Re-encryption , 2009, CT-RSA.
[6] Benoît Libert,et al. Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.
[7] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[8] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[9] Moni Naor,et al. Traitor tracing with constant size ciphertext , 2008, CCS.
[10] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[11] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[12] Robert H. Deng,et al. Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.
[13] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[14] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[15] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[16] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[17] Willy Susilo,et al. Interactive conditional proxy re-encryption with fine grain policy , 2011, J. Syst. Softw..
[18] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[19] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[20] Xiaohui Liang,et al. Attribute based proxy re-encryption with delegating capabilities , 2009, ASIACCS '09.
[21] Jacob C. N. Schuldt,et al. Wildcarded Identity-Based Encryption , 2010, Journal of Cryptology.
[22] Zhenfu Cao,et al. CCA-Secure Proxy Re-Encryption without Pairings , 2009, IACR Cryptol. ePrint Arch..
[23] Tanja Lange,et al. Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings , 2010, AFRICACRYPT.
[24] Stanislaw Jarecki,et al. Public Key Cryptography – PKC 2009 , 2009, Lecture Notes in Computer Science.
[25] Ronald Cramer,et al. Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings , 2008, Public Key Cryptography.
[26] Hugo Krawczyk,et al. Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.
[27] Robert H. Deng,et al. Conditional proxy re-encryption secure against chosen-ciphertext attack , 2009, ASIACCS '09.
[28] Vincent Rijmen,et al. Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings , 2008, INDOCRYPT.
[29] Xiaohui Liang,et al. Proxy re-encryption with keyword search , 2010, Inf. Sci..
[30] Moti Yung,et al. A New Randomness Extraction Paradigm for Hybrid Encryption , 2009, EUROCRYPT.
[31] Marc Fischlin,et al. Topics in Cryptology – CT-RSA 2009 , 2009 .
[32] Steven D. Galbraith,et al. Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings , 2008, Pairing.
[33] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[34] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.
[35] Robert H. Deng,et al. Conditional Proxy Broadcast Re-Encryption , 2009, ACISP.
[36] Susan Hohenberger,et al. Advances in signatures, encryption, and E-Cash from bilinear groups , 2006 .
[37] Robert H. Deng,et al. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security , 2009, ISC.
[38] Sébastien Canard,et al. Combined Proxy Re-encryption , 2013, ICISC.
[39] C. Pandu Rangan,et al. Conditional Proxy Re-Encryption - A More Efficient Construction , 2011 .
[40] Qiang Tang,et al. Type-Based Proxy Re-encryption and Its Construction , 2008, INDOCRYPT.
[41] Natarajan Meghanathan,et al. Advances in Network Security and Applications , 2011 .
[42] Nigel P. Smart,et al. Identity-Based Encryption Gone Wild , 2006, ICALP.