Back to Results
First PageMeta Content
Ciphertext / RSA / ElGamal encryption / Boneh/Franklin scheme / Public-key cryptography / Adaptive chosen-ciphertext attack / Chosen-plaintext attack / Cipher / Chosen-ciphertext attack / Cryptography / Proxy re-encryption / ID-based encryption


Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute
Add to Reading List

Document Date: 2006-12-15 20:05:23


Open Document

File Size: 217,25 KB

Share Result on Facebook

City

Hierarchical Identity / Elgamal / /

Company

G1 / idC / GT / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

building CCA-secure Identity-Based Encryption / Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute Johns Hopkins University / /

IndustryTerm

private-key generation algorithm / decryption algorithm / re-encryption algorithm / proxy re-encryption protocols / cryptographic protocols / costly online request / probabilistic polynomial time algorithms / law enforcement / /

Organization

Johns Hopkins University / /

Person

Matthew Green Giuseppe Ateniese / Bob / Key Generator / Alice / /

Position

IND-Pr-ID-CPA / AdvIND-Pr-ID-CPA / CPA / Private / /

Product

Halevi / Canetti / Franklin / Katz / IBP1 / /

ProvinceOrState

Rhode Island / /

Technology

private-key generation algorithm / proxy re-encryption protocols / Decrypt algorithm / bidirectional re-encryption / probabilistic polynomial time algorithms / quorum-based protocol / extended Identity Based Encryption / proxy re-encryption / identity-based encryption / secret key / re-encryption algorithm / extracted re-encryption / specified F-O decryption algorithm / Non-interactive Identity-Based Proxy Re-encryption / 3.1 Identity-Based Proxy Re-Encryption An Identity-Based Proxy Re-encryption / Encryption / Reencrypt algorithm / KeyGen algorithm / unidirectional proxy encryption / public key / CCA2-secure public-key encryption / public-key encryption / IBE encryption / public-key searchable encryption / second algorithm / Encrypt algorithm / using double-encryption / Identity-Based proxy re-encryption / /

SocialTag