Non-Transferable Proxy Re-Encryption
暂无分享,去创建一个
Jing Xu | Zhenfeng Zhang | Hui Guo | Zhenfeng Zhang | Hui Guo | Jing Xu
[1] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[2] Yupu Hu,et al. Cryptanalysis of GGH Map , 2016, EUROCRYPT.
[3] Huijia Lin,et al. Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes , 2016, EUROCRYPT.
[4] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[5] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[6] Abhi Shelat,et al. Securely Obfuscating Re-Encryption , 2007, Journal of Cryptology.
[7] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[8] Vinod Vaikuntanathan,et al. Functional Re-encryption and Collusion-Resistant Obfuscation , 2012, TCC.
[9] Koji Okada,et al. Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption , 2011, IWSEC.
[10] Alvaro A. Cárdenas,et al. Towards a secure and interoperable DRM architecture , 2006, DRM '06.
[11] Feng-Hao Liu,et al. Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices , 2014, Public Key Cryptography.
[12] Hui Guo,et al. Proxy Re-encryption with Unforgeable Re-encryption Keys , 2014, CANS.
[13] Eiji Okamoto,et al. New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks , 2010, Pairing.
[14] Xinwen Zhang,et al. CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud , 2012, ASIACCS '12.
[15] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[16] Benoît Libert,et al. Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.
[17] Craig Gentry,et al. Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations , 2015, CRYPTO.
[18] Mihir Bellare,et al. Point-Function Obfuscation: A Framework and Generic Constructions , 2015, TCC.
[19] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[20] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[21] Dan Boneh,et al. Hosting Services on an Untrusted Cloud , 2015, EUROCRYPT.
[22] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.
[23] Keisuke Tanaka,et al. Attacks to the Proxy Re-Encryption Schemes from IWSEC2011 , 2013, IWSEC.
[24] Zhenfeng Zhang,et al. PRE: Stronger security notions and efficient construction with non-interactive opening , 2014, Theor. Comput. Sci..
[25] Amit Sahai,et al. Coding Constructions for Blacklisting Problems without Computational Assumptions , 1999, CRYPTO.