Pages that link to "Item:Q3183588"
From MaRDI portal
The following pages link to Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions (Q3183588):
Displayed 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Self-updatable encryption with short public parameters and its extensions (Q264135) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Constant-size structure-preserving signatures: generic constructions and simple assumptions (Q321316) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Fully secure revocable attribute-based encryption (Q407453) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES (Q499658) (← links)
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- An expressive and provably secure ciphertext-policy attribute-based encryption (Q726482) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- SEMD: secure and efficient message dissemination with policy enforcement in VANET (Q736616) (← links)
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Smooth NIZK arguments (Q1629410) (← links)
- Unbounded ABE via bilinear entropy expansion, revisited (Q1648812) (← links)
- Revocable hierarchical identity-based encryption with shorter private keys and update keys (Q1671645) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- Dual trapdoor identity-based encryption with keyword search (Q1701741) (← links)
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing (Q1701978) (← links)
- Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing (Q1703692) (← links)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q1708030) (← links)
- Adaptively simulation-secure attribute-hiding predicate encryption (Q1710619) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- Identity-based quotable ring signature (Q1750014) (← links)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem (Q1750339) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Bonsai trees, or how to delegate a lattice basis (Q1928766) (← links)
- Relations between semantic security and anonymity in identity-based encryption (Q1944921) (← links)
- Flexible attribute-based proxy re-encryption for efficient data sharing (Q1999111) (← links)
- Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation (Q2004746) (← links)
- Predicate signatures from pair encodings via dual system proof technique (Q2009416) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Revocable hierarchical identity-based encryption (Q2015131) (← links)
- Confined guessing: new signatures from standard assumptions (Q2018822) (← links)
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption (Q2035455) (← links)
- Novel generic construction of leakage-resilient PKE scheme with CCA security (Q2035456) (← links)
- Revocable hierarchical identity-based encryption with adaptive security (Q2043020) (← links)
- Simple and efficient FE for quadratic functions (Q2043408) (← links)
- Tag-based ABE in prime-order groups via pair encoding (Q2043416) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Adaptively secure ABE for DFA from \(k\)-Lin and more (Q2055655) (← links)