Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019Yutaka KAWAI +4 more
openaire +1 more source
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
IEEE Systems Journal, 2022Kwame Opuni-Boachie Obour Agyekum +2 more
exaly
P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption
IEEE Transactions on Vehicular Technology, 2020SUMANA MAITI, Sudip Misra
exaly
Flexible attribute-based proxy re-encryption for efficient data sharing
Information Sciences, 2020Hua Deng, Zheng Qin, Qianhong Wu
exaly
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
Journal of Network and Computer Applications, 2021Ahsan Manzoor +2 more
exaly
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security, 2006Matthew D Green, Susan Hohenberger
exaly
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation
Journal of Network and Computer Applications, 2017David Nuñez, Isaac Agudo, Javier Lopez
exaly
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
Future Generation Computer Systems, 2015Kaitai Liang, Man Ho Au, Willy Susilo
exaly
Multi-use and unidirectional identity-based proxy re-encryption schemes
Information Sciences, 2010Zhenfu Cao, Licheng Wang
exaly

