Group-based unidirectional proxy re-encryption scheme

被引:0
|
作者
School of Information and Communication, Guilin University of Electronic and Technology, Guilin, Guangxi, 541004, China [1 ]
机构
来源
Inf. Technol. J. | 2009年 / 1卷 / 83-88期
关键词
Cryptography;
D O I
10.3923/itj.2009.83.88
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Group-Based Proxy Re-encryption Scheme
    Ma, Chunbo
    Ao, Jun
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1025 - 1034
  • [2] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575
  • [3] Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 76 - +
  • [4] Group-based proxy re-encryption scheme secure against chosen ciphertext attack
    Ma, Chunbo
    Ao, Jun
    International Journal of Network Security, 2009, 8 (03) : 266 - 270
  • [5] A proxy re-encryption scheme based on elliptic curve group
    Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):
  • [6] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [7] A Lattice-based Unidirectional Proxy Re-encryption
    Wang, Lewei
    Jiang, Mingming
    Guo, Yuyan
    Ge, Hui
    International Journal of Network Security, 2024, 26 (04) : 598 - 604
  • [8] Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes
    Singh, Kunwar
    Rangan, C. Pandu
    Sheshank, Samir
    Agrawal, Richa
    IET INFORMATION SECURITY, 2021, 15 (01) : 1 - 12
  • [9] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [10] On the Insecurity of an Identity Based Proxy Re-encryption Scheme
    Wang, Xu An
    Yang, Xiaoyuan
    FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 277 - 281