Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
Proxy re-encryption realizes delegation of decryption rights, enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice into an encryption of the same message for Bob. Proxy re-encryption is a very useful primitive, having many applications in distributed fil...
Saved in:
Main Authors: | Weng, Jian, DENG, Huijie, Robert, Liu, Shengli, Chen, Kefei |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2010
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1303 https://ink.library.smu.edu.sg/context/sis_research/article/2302/viewcontent/Deng2010yanjiang_proxy_encryption.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairing
by: DENG, Robert H., et al.
Published: (2008) -
Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security
by: WENG, Jian, et al.
Published: (2009) -
Efficient unidirectional proxy re-encryption
by: CHOW, Sherman, et al.
Published: (2010) -
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
by: Lai, Junzuo, et al.
Published: (2014) -
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
by: WENG, Jian, et al.
Published: (2010)