Proxy re-encryption

Results: 44



#Item
1Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-03 11:03:06
2Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

Add to Reading List

Source URL: www.nucypher.com

Language: English
3

Combined Proxy Re-Encryption Orange Labs, Applied Crypto Group, Université de Caen Basse-Normandie, GREYC, Sébastien Canard et Julien Devigne Journées C2 2012, Dinard

Add to Reading List

Source URL: webmath.univ-rennes1.fr

Language: English - Date: 2016-03-14 12:25:52
    4

    Proxy Re-Encryption Advisor(s): Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    - Date: 2015-09-08 06:00:03
      5Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

      ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

      Add to Reading List

      Source URL: www.ijmetmr.com

      Language: English - Date: 2015-07-06 14:15:02
      6Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System

      ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

      Add to Reading List

      Source URL: www.ijmetmr.com

      Language: English - Date: 2015-06-03 03:06:48
      7Public-key cryptography / Cryptography / Encryption / Ciphertext indistinguishability / Attribute-based encryption / ID-based encryption / RSA / Cipher / Data Encryption Standard / Identity-based conditional proxy re-encryption / Semantic security

      2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:43:14
      8

      Tracing Malicious Proxies in Proxy Re-Encryption Benoˆıt Libert1 and Damien Vergnaud2 1 Universit´e Catholique de Louvain, Crypto Group

      Add to Reading List

      Source URL: perso.uclouvain.be

      Language: English - Date: 2008-07-30 08:44:52
        9

        Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption⋆ ⋆⋆ Benoˆıt Libert1 and Damien Vergnaud2 1 Universit´e Catholique de Louvain, Crypto Group

        Add to Reading List

        Source URL: perso.uclouvain.be

        Language: English - Date: 2008-11-18 04:38:15
          10Cryptography / Encryption / ElGamal encryption / Mix network / Ciphertext / Public-key cryptography / RSA / Cipher / Identity-based conditional proxy re-encryption / Proxy re-encryption

          Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

          Add to Reading List

          Source URL: www0.cs.ucl.ac.uk

          Language: English - Date: 2013-10-10 06:49:00
          UPDATE