International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 11000 results
CCA-Secure PRE Scheme without Random Oracles
Eprint
https://eprint.iacr.org/2010/112
Jun Shao Zhenfu Cao Peng Liu
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation...
last revised 1 Mar 2010
Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009
Eprint
https://eprint.iacr.org/2009/344
Xi Zhang Min-Rong Chen Xia Li
In Eurocrypt'98, Blaze, Bleumer and Strauss [4] introduced a primitive named proxy re-encryption (PRE), in which a semi-trusted proxy can convert - without seeing the plaintext - a ciphertext originally intended for Alice into...
last revised 13 Jul 2009
CCA-Secure Proxy Re-Encryption without Pairings
Eprint
https://eprint.iacr.org/2009/164
Jun Shao Zhenfu Cao
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation...
last revised 19 Oct 2009
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
Eprint
https://eprint.iacr.org/2010/265
Jian Weng Minrong Chen Yanjiang Yang Robert H. Deng Kefei Chen Feng Bao
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss in Eurocrypt'98, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the same message intended for Bob....
received 8 May 2010
CCA-Secure Proxy Re-encryption without Pairings
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=18732
Jun Shao Zhenfu Cao
Pkc 2009
Efficient Unidirectional Proxy Re-Encryption
Eprint
https://eprint.iacr.org/2009/189
Sherman S.M. Chow Jian Weng Yanjiang Yang Robert H. Deng
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re-encryption key given by Alice, and cannot...
last revised 5 Mar 2010
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings
Eprint
https://eprint.iacr.org/2008/509
Jian Weng Robert H. Deng Shengli Liu Kefei Chen Junzuo Lai Xuan Wang
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the same message intended for Bob. Proxy...
last revised 4 May 2009
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
Eprint
https://eprint.iacr.org/2015/297
Junzuo Lai Robert H. Deng Shengli Liu Jian Weng Yunlei Zhao
Security against selective opening attack (SOA) requires that in a multi-user setting, even if an adversary has access to all ciphertexts from users, and adaptively corrupts some fraction of the users by exposing not only...
received 29 Mar 2015
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy
Eprint
https://eprint.iacr.org/2011/208
Jian Weng Yunlei Zhao
In this work, we study (the direct constructions of) bidirectional proxy re-encryption (PRE) with alleviated trust in the proxy, specifically the master secret security (MSS) and the non-transitivity (NT) security, in the...
last revised 8 May 2011
IACR PKC 2016
https://iacr.org/archive/pkc2016/pkc2016-index.html
PKC 2016: Giuseppe Persiano and Bo-Yin Yang(Eds.): Public-Key Cryptography - PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings...
Various Proxy Re-Encryption Schemes from Lattices
Eprint
https://eprint.iacr.org/2016/278
Xiong Fan Feng-Hao Liu
Proxy re-encryption (PRE) was introduced by Blaze, Bleumer and Strauss [Eurocrypt '98]. Basically, PRE allows a semi-trusted proxy to transform a ciphertext encrypted under one key into an encryption of the same plaintext...
last revised 25 May 2017
CCA-Secure Keyed-Fully Homomorphic Encryption
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27731
Junzuo Lai Robert H. Deng Changshe Ma Kouichi Sakurai Jian Weng
Pkc 2016
Efficient CCA-secure Threshold Public-Key Encryption Scheme
Eprint
https://eprint.iacr.org/2013/749
Xi-Jun Lin Lin Sun
In threshold public-key encryption, the decryption key is divided into n shares, each one of which is given to a different decryption user in order to avoid single points of failure. In this study, we propose a simple and...
received 13 Nov 2013
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
Eprint
https://eprint.iacr.org/2010/319
Jian Weng Yunlei Zhao
In PKC 2010, Matsuda, Nishimaki and Tanaka proposed a bidirectional proxy re-encryption (PRE) scheme without bilinear maps, and claimed that their scheme is chosen-ciphertext secure in the standard model. However, by giving a...
last revised 30 May 2010
Unknown
https://iacr.org/workshops/pkc2011/Abstracts_files/widget1_markup.html
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh, David Mandell Freeman We propose a linearly homomorphic signature scheme that authenticates vector subspaces of a given...
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
Eprint
https://eprint.iacr.org/2018/1136
S. Sharmila Deva Selvi Arinjita Paul C. Pandu Rangan
Proxy re-encryption (PRE) enables delegation of decryption rights by entrusting a proxy server with special information, that allows it to transform a ciphertext under one public key into a ciphertext of the same message under...
received 21 Nov 2018
Jun Shao
Author
https://iacr.org/cryptodb/data/author.php?authorkey=3381
Shanghai Jiao Tong University
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
Eprint
https://eprint.iacr.org/2015/272
Baodong Qin Shengli Liu
In AsiaCrypt~2013, Qin and Liu proposed a new approach to CCA-security of Public-Key Encryption (PKE) in the presence of bounded key-leakage, from any universal hash proof system (due to Cramer and Shoup) and any one-time...
received 23 Mar 2015
Proxy Re-Encryption and Re-Signatures from Lattices
Eprint
https://eprint.iacr.org/2017/456
Xiong Fan Feng-Hao Liu
Proxy re-encryption (PRE) and Proxy re-signature (PRS) were introduced by Blaze, Bleumer and Strauss [Eurocrypt '98]. Basically, PRE allows a semi-trusted proxy to transform a ciphertext encrypted under one key into an...
last revised 27 Jan 2018
Accepted Papers @ Public Key Cryptography 2009
https://iacr.org/workshops/pkc2009/accepted.html
Accepted Papers Cryptanalysis and Computational Number Theory A practical key recovery attack on basic TCHo , Gregor Leander, Technical University of Denmark; Mathias Herrmann, HGI, Ruhr-University of Bochum Implicit...
Next ►