Proxy re-encryption

Results: 44



#Item
11

Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme∗ Keying Li1†, Jianfeng Wang2 , Yinghui Zhang3 , and Hua Ma1 of mathematics and statistics, Xidian University, P.R.China and ma

Add to Reading List

Source URL: isyou.info

Language: English - Date: 2014-05-12 01:06:33
    12Cryptography / Proxy re-encryption

    Cryptographically Enforced Distributed Data Access Control Luan Ibraimi Composition of the Graduation Committee: Prof. Dr. Ir.

    Add to Reading List

    Source URL: eprints.eemcs.utwente.nl

    Language: English - Date: 2011-10-24 09:53:48
    13Oblivious transfer / Asiacrypt / International Cryptology Conference / Algorithmic Number Theory Symposium / Cryptography / Proxy re-encryption / Lecture Notes in Computer Science

    Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

    Add to Reading List

    Source URL: spar.isi.jhu.edu

    Language: English - Date: 2013-09-11 11:45:30
    14

    Analysis on the Security of an Identity Based Proxy Re-encryption Xu an Wang and Xiaoyuan Yang Key Laboratory of Information and Network Security Engneering College of Chinese Armed Police Force, P. R. China E-mail:wangx

    Add to Reading List

    Source URL: grouper.ieee.org

    - Date: 2009-06-26 15:24:13
      15

      Introduction Review of Identity Based Proxy Re-encryption Proposed in Pairing’07 Attacks Conclusions Acknowledgements

      Add to Reading List

      Source URL: grouper.ieee.org

      Language: English - Date: 2009-06-26 15:24:13
        16

        Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage∗ Giuseppe Ateniese† Kevin Fu‡

        Add to Reading List

        Source URL: spar.isi.jhu.edu

        Language: English - Date: 2005-02-04 17:13:07
          17Network performance / Internet privacy / Proxy server / Cipher / RSA / Proxy re-encryption / Cryptography / Computing / Computer networking

          1 A Multi-key Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation Siu F. Yeung, John C. S. Lui, Senior Member, IEEE, David K. Y. Yau, Member, IEEE

          Add to Reading List

          Source URL: www.cs.cuhk.hk

          Language: English - Date: 2004-06-10 10:49:44
          18Public-key cryptography / Key / Symmetric-key algorithm / Proxy re-encryption / ID-based encryption / Cryptography / Key management / Cipher

          DATA CENTER Encryption Solution Design and Deployment Considerations This Encryption Solution Design and Deployment Considerations reference guide is designed to help customers and partners

          Add to Reading List

          Source URL: www.brocade.com

          Language: English - Date: 2014-10-16 13:08:00
          19Ciphertext / RSA / ElGamal encryption / Boneh/Franklin scheme / Public-key cryptography / Adaptive chosen-ciphertext attack / Chosen-plaintext attack / Cipher / Chosen-ciphertext attack / Cryptography / Proxy re-encryption / ID-based encryption

          Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2006-12-15 20:05:23
          20Oblivious transfer / Asiacrypt / International Cryptology Conference / Algorithmic Number Theory Symposium / Cryptography / Proxy re-encryption / Lecture Notes in Computer Science

          Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

          Add to Reading List

          Source URL: spar.isi.jhu.edu

          Language: English - Date: 2013-09-11 11:45:30
          UPDATE