Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications requiring delegation. However, it is inadequate to handle scenarios where a fine-gr...
Saved in:
Main Authors: | Weng, Jian, DENG, Robert H., DING, Xuhua, CHU, Cheng-Kang, LAI, Junzuo |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2009
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/453 http://dx.doi.org/10.1145/1533057.1533100 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security
by: WENG, Jian, et al.
Published: (2009) -
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairing
by: DENG, Robert H., et al.
Published: (2008) -
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
by: Weng, Jian, et al.
Published: (2010) -
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
by: Lai, Junzuo, et al.
Published: (2014) -
Anonymous identity-based broadcast encryption with chosen-ciphertext security
by: HE, Kai, et al.
Published: (2016)