Sciweavers

94 search results - page 1 / 19
» Proxy Re-signature Schemes Without Random Oracles
Sort
View
ISW
2007
Springer
14 years 5 months ago
Identity-Based Proxy Re-encryption Without Random Oracles
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert ...
Cheng-Kang Chu, Wen-Guey Tzeng
INDOCRYPT
2007
Springer
14 years 5 months ago
Proxy Re-signature Schemes Without Random Oracles
Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
EUROCRYPT
2006
Springer
14 years 2 months ago
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
We present the first aggregate signature, the first multisignature, and the first verifiably encrypted signature provably secure without random oracles. Our constructions derive f...
Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shac...
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
14 years 11 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
14 years 5 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese