Proxy re-encryption

Results: 44



#Item
1Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-03 11:03:06
2NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

Add to Reading List

Source URL: www.nucypher.com

Language: English
3Combined Proxy Re-Encryption  Orange Labs, Applied Crypto Group, Université de Caen Basse-Normandie, GREYC, Sébastien Canard et Julien Devigne Journées C2 2012, Dinard

Combined Proxy Re-Encryption Orange Labs, Applied Crypto Group, Université de Caen Basse-Normandie, GREYC, Sébastien Canard et Julien Devigne Journées C2 2012, Dinard

Add to Reading List

Source URL: webmath.univ-rennes1.fr

Language: English - Date: 2016-03-14 12:25:52
    4Proxy Re-Encryption Advisor(s): Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

    Proxy Re-Encryption Advisor(s): Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    - Date: 2015-09-08 06:00:03
      5ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

      ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

      Add to Reading List

      Source URL: www.ijmetmr.com

      Language: English - Date: 2015-07-06 14:15:02
      6ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

      ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

      Add to Reading List

      Source URL: www.ijmetmr.com

      Language: English - Date: 2015-06-03 03:06:48
      72015 IEEE Symposium on Security and Privacy  Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

      2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:43:14
      8Tracing Malicious Proxies in Proxy Re-Encryption Benoˆıt Libert1 and Damien Vergnaud2 1  Universit´e Catholique de Louvain, Crypto Group

      Tracing Malicious Proxies in Proxy Re-Encryption Benoˆıt Libert1 and Damien Vergnaud2 1 Universit´e Catholique de Louvain, Crypto Group

      Add to Reading List

      Source URL: perso.uclouvain.be

      Language: English - Date: 2008-07-30 08:44:52
        9Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption⋆ ⋆⋆ Benoˆıt Libert1 and Damien Vergnaud2 1  Universit´e Catholique de Louvain, Crypto Group

        Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption⋆ ⋆⋆ Benoˆıt Libert1 and Damien Vergnaud2 1 Universit´e Catholique de Louvain, Crypto Group

        Add to Reading List

        Source URL: perso.uclouvain.be

        Language: English - Date: 2008-11-18 04:38:15
          10Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

          Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

          Add to Reading List

          Source URL: www0.cs.ucl.ac.uk

          Language: English - Date: 2013-10-10 06:49:00