Factoring-Based Proxy Re-Encryption Schemes
暂无分享,去创建一个
Keisuke Tanaka | Toshiyuki Isshiki | Manh Ha Nguyen | M. H. Nguyen | Keisuke Tanaka | Toshiyuki Isshiki
[1] Ed Dawson,et al. Topics in Cryptology – CT-RSA 2013 , 2013, Lecture Notes in Computer Science.
[2] Masakatsu Nishigaki,et al. Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings , 2011, IWSEC.
[3] Tanja Lange,et al. Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings , 2010, AFRICACRYPT.
[4] Eike Kiltz,et al. Practical Chosen Ciphertext Secure Encryption from Factoring , 2009, EUROCRYPT.
[5] Ryo Nishimaki,et al. CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model , 2010, Public Key Cryptography.
[6] Sébastien Canard,et al. Improving the Security of an Efficient Unidirectional Proxy Re-Encryption Scheme , 2011, J. Internet Serv. Inf. Secur..
[7] Moti Yung,et al. A New Randomness Extraction Paradigm for Hybrid Encryption , 2009, EUROCRYPT.
[8] Robert H. Deng,et al. Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.
[9] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[10] Ronald Cramer,et al. Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings , 2008, Public Key Cryptography.
[11] Koji Okada,et al. Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption , 2011, IWSEC.
[12] Mark Manulis,et al. Cryptology and Network Security , 2012, Lecture Notes in Computer Science.
[13] Frederik Vercauteren,et al. Practical Realisation and Elimination of an ECC-Related Software Bug Attack , 2012, CT-RSA.
[14] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[15] Adi Shamir,et al. On the generation of cryptographically strong pseudorandom sequences , 1981, TOCS.
[16] Tal Rabin. Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings , 2010, CRYPTO.
[17] Kefei Chen,et al. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings , 2008, CANS.
[18] Keisuke Tanaka,et al. Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 , 2013, CT-RSA.
[19] Yunlei Zhao,et al. Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption , 2012, CT-RSA.
[20] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.
[21] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[22] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[23] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption , 2008, Public Key Cryptography.
[24] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[25] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[26] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[27] Aggelos Kiayias,et al. Multi-query Computationally-Private Information Retrieval with Constant Communication Rate , 2010, Public Key Cryptography.
[28] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[29] Hoeteck Wee,et al. Efficient Chosen-Ciphertext Security via Extractable Hash Proofs , 2010, CRYPTO.