NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU
暂无分享,去创建一个
[1] Xavier Boyen,et al. Key-Private Proxy Re-encryption under LWE , 2013, INDOCRYPT.
[2] Bo Yang,et al. Efficient Traitor Tracing Scheme Based On NTRU , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).
[3] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[4] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.
[5] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[6] Robert H. Deng,et al. Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings , 2010, Inf. Sci..
[7] Elaine B. Barker,et al. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography , 2007 .
[8] Ron Steinfeld,et al. Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices , 2013, IACR Cryptol. ePrint Arch..
[9] Joseph H. Silverman,et al. NTRU in Constrained Devices , 2001, CHES.
[10] Elaine B. Barker,et al. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography | NIST , 2006 .
[11] Elaine B. Barker,et al. SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) , 2007 .
[12] Ron Steinfeld,et al. Making NTRU as Secure as Worst-Case Problems over Ideal Lattices , 2011, EUROCRYPT.
[13] Nick Howgrave-Graham,et al. IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices. , 2008 .
[14] Frederik Vercauteren,et al. Speed Records for NTRU , 2010, CT-RSA.
[15] Elaine B. Barker,et al. SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .
[16] Keisuke Tanaka,et al. Proxy Re-Encryption based on Learning with Errors (Mathematical Foundation of Algorithms and Computer Science) , 2010 .
[17] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[18] Philippe Gaborit,et al. A fast private information retrieval protocol , 2008, 2008 IEEE International Symposium on Information Theory.
[19] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[20] Susan Hohenberger,et al. Key-Private Proxy Re-encryption , 2009, CT-RSA.
[21] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[22] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[23] Henk L. Muller,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001, Lecture Notes in Computer Science.
[24] Philippe Gaborit,et al. A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol , 2007, IACR Cryptol. ePrint Arch..
[25] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[26] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[27] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[28] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[29] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[30] Wen-Guey Tzeng,et al. Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.