Identity Based Proxy Re-encryption Scheme under LWE
暂无分享,去创建一个
Qiaoyan Wen | Ping Zheng | Hua Zhang | Wenmin Li | Wei Yin | Hua Zhang | Wenmin Li | Wei Yin | Q. Wen | P. Zheng
[1] Zhenfeng Zhang,et al. PRE: Stronger security notions and efficient construction with non-interactive opening , 2014, Theor. Comput. Sci..
[2] Elena Kirshanova,et al. Proxy Re-encryption from Lattices , 2014, Public Key Cryptography.
[3] Xavier Boyen,et al. Key-Private Proxy Re-encryption under LWE , 2013, INDOCRYPT.
[4] Chris Peikert,et al. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..
[5] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[6] Marcel Keller,et al. On the Amortized Complexity of Zero-Knowledge Protocols , 2009, Journal of Cryptology.
[7] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[8] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[9] Wen-Guey Tzeng,et al. Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.
[10] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[11] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[12] Daniele Micciancio,et al. Worst-case to average-case reductions based on Gaussian measures , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[13] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] C. Pandu Rangan,et al. Lattice Based Identity Based Proxy Re-Encryption Scheme , 2013, J. Internet Serv. Inf. Secur..
[16] Keita Xagawa,et al. Cryptography with Lattices , 2010 .
[17] David Cash,et al. How to Delegate a Lattice Basis , 2009, IACR Cryptol. ePrint Arch..
[18] Xavier Boyen,et al. Identity-Based Encryption from Lattices in the Standard Model , 2009 .
[19] Daniele Micciancio. 1 . 2 Lattice-based cryptography , 2008 .
[20] Shafi Goldwasser,et al. Complexity of lattice problems - a cryptographic perspective , 2002, The Kluwer international series in engineering and computer science.
[21] Miklós Ajtai,et al. Generating Hard Instances of Lattice Problems , 1996, Electron. Colloquium Comput. Complex..