A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing
暂无分享,去创建一个
C. Pandu Rangan | S. Sharmila Deva Selvi | Arinjita Paul | S. S. D. Selvi | Arinjita Paul | C. Rangan | S. Sharmila | Deva Selvi | C. Pandu
[1] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[2] Xiaohui Liang,et al. Attribute based proxy re-encryption with delegating capabilities , 2009, ASIACCS '09.
[3] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[4] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[5] Robert H. Deng,et al. On the security of two identity-based conditional proxy re-encryption schemes , 2016, Theor. Comput. Sci..
[6] Jiguo Li,et al. Provably Secure Certificate-based Conditional Proxy Re-encryption , 2016, J. Inf. Sci. Eng..
[7] C. Pandu Rangan,et al. EFFICIENT CONDITIONAL PROXY RE- ENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY , 2012 .
[8] Robert H. Deng,et al. Conditional Proxy Broadcast Re-Encryption , 2009, ACISP.
[9] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[10] Willy Susilo,et al. Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search , 2012, Theor. Comput. Sci..
[11] Qiang Tang,et al. Type-Based Proxy Re-encryption and Its Construction , 2008, INDOCRYPT.
[12] Willy Susilo,et al. Hierarchical conditional proxy re-encryption , 2012, Comput. Stand. Interfaces.
[13] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[14] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[15] Robert H. Deng,et al. Conditional proxy re-encryption secure against chosen-ciphertext attack , 2009, ASIACCS '09.
[16] Jiguo Li,et al. Certificate-Based Conditional Proxy Re-Encryption , 2015, NSS.
[17] Willy Susilo,et al. Anonymous Conditional Proxy Re-encryption without Random Oracle , 2009, ProvSec.
[18] C. Pandu Rangan,et al. Conditional Proxy Re-Encryption - A More Efficient Construction , 2011 .
[19] Yongjun Ren,et al. A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system , 2019, J. Inf. Secur. Appl..
[20] C. Pandu Rangan,et al. Certificateless Proxy Re-Encryption Without Pairing: Revisited , 2015, SCC@ASIACCS.
[21] Yixian Yang,et al. PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks , 2017, Future Gener. Comput. Syst..
[22] Hoonjae Lee,et al. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security , 2009, 2014 Ninth Asia Joint Conference on Information Security.
[23] Robert H. Deng,et al. Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.
[24] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[25] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[26] Benoît Libert,et al. Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.
[27] Yun Ling,et al. Identity-Based Conditional Proxy Re-Encryption , 2011, 2011 IEEE International Conference on Communications (ICC).
[28] Joseph K. Liu,et al. Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption , 2015, Comput. J..
[29] Zhen Liu,et al. A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles , 2012, ICISC.
[30] Donghyun Kim,et al. Conditional proxy re-encryption for secure big data group sharing in cloud environment , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).