Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- 1 June 2014
- journal article
- Published by Elsevier BV in Theoretical Computer Science
- Vol. 539, 87-105
- https://doi.org/10.1016/j.tcs.2014.04.027
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryptionInformation Sciences, 2012
- Identity-Based Proxy Cryptosystems with Revocability and Hierarchical ConfidentialitiesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012
- Secure and Efficient IBE-PKE Proxy Re-EncryptionIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
- Multi-use and unidirectional identity-based proxy re-encryption schemesInformation Sciences, 2010
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oraclesScience China Information Sciences, 2010
- Chosen‐Ciphertext Security from Identity‐Based EncryptionSIAM Journal on Computing, 2007
- Improved proxy re-encryption schemes with applications to secure distributed storageACM Transactions on Information and System Security, 2006
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext AttackSIAM Journal on Computing, 2003
- How to construct random functionsJournal of the ACM, 1986