Back to Results
First PageMeta Content
Advantage / Chosen-ciphertext attack / Semantic security / Ciphertext / Chosen-plaintext attack / Cipher / ElGamal encryption / Cryptography / Public-key cryptography / Proxy re-encryption


Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack ABSTRACT In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice’s public key into encr
Add to Reading List

Document Date: 2008-12-07 02:49:54


Open Document

File Size: 246,82 KB

Share Result on Facebook

Company

Proxy Re-Encryption Systems / ACM Press / /

Currency

pence / USD / /

Event

FDA Phase / /

Facility

Management University / /

IndustryTerm

re-encryption algorithm / generation algorithm / setup algorithm / delegated email processing / email server / secure distributed file systems / decryption algorithm / polynomial-time algorithm / condition key generation algorithm / partial re-encryption key generation algorithm / re-encryption systems / encryption algorithm / /

Organization

office of Research / Management University / /

Person

Bob / Alice / Eiji Okamoto / Masahiro Mambo / /

Position

department manager / CPA / secretary / /

Product

Franklin / H4 / qH3 / qH5 / H1list / /

ProvinceOrState

Connecticut / /

Technology

encryption / condition key generation algorithm / Cryptography / three algorithms / following seven algorithms / seven algorithms / key generation algorithm / public key / Divertible Protocols / encryption algorithm / PKI / polynomial-time algorithm / setup algorithm / Identity-Based Encryption / encryption system / partial re-encryption key generation algorithm / private key / secret key / CCA-secure ElGamal encryption / re-encryption algorithm / simulation / decryption algorithm / universal re-encryption / 1 Re-Encryption / pdf / qre re-encryption / Public Key Encryption / /

URL

http /

SocialTag