<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption
Date: 2018-05-03 11:03:06
Cryptography
Public-key cryptography
Proxy re-encryption
ID-based encryption
Homomorphic encryption
ElGamal encryption
Chosen-ciphertext attack
Encryption
RSA
Key
Symmetric-key algorithm
Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 571,65 KB

Share Document on Facebook

Similar Documents

Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

DocID: 1xTjK - View Document

Toward Automated Analysis and Prototyping of Homomorphic Encryption Schemes Cyrielle FERON Loïc LAGADEC Vianney LAPOTRE

Toward Automated Analysis and Prototyping of Homomorphic Encryption Schemes Cyrielle FERON Loïc LAGADEC Vianney LAPOTRE

DocID: 1vm3I - View Document

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1

DocID: 1vjjZ - View Document

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2  1

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2 1

DocID: 1vf4f - View Document

A Full RNS Implementation of Fan and Vercauteren Somewhat Homomorphic Encryption Scheme Presented by: Vincent Zucca1 Joint work with: Jean-Claude Bajard1 , Julien Eynard2 and Anwar Hasan2 1 Sorbonne

A Full RNS Implementation of Fan and Vercauteren Somewhat Homomorphic Encryption Scheme Presented by: Vincent Zucca1 Joint work with: Jean-Claude Bajard1 , Julien Eynard2 and Anwar Hasan2 1 Sorbonne

DocID: 1vaCY - View Document