Pages that link to "Item:Q5307255"
From MaRDI portal
The following pages link to Advances in Cryptology - EUROCRYPT 2004 (Q5307255):
Displaying 50 items.
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles (Q387810) (← links)
- Broadcast encryption based non-interactive key distribution in MANETs (Q389369) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle (Q497143) (← links)
- Certificate-based proxy decryption systems with revocability in the standard model (Q497594) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search (Q690450) (← links)
- Provable secure identity based generalized signcryption scheme (Q708214) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Secure public-key encryption scheme without random oracles (Q942322) (← links)
- A new framework for the design and analysis of identity-based identification schemes (Q955014) (← links)
- Fully CCA2 secure identity based broadcast encryption without random oracles (Q987813) (← links)
- Extensions of access structures and their cryptographic applications (Q989607) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Upgrading to functional encryption (Q1629441) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Revocable hierarchical identity-based encryption with shorter private keys and update keys (Q1671645) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption (Q1711842) (← links)
- A black-box construction of non-malleable encryption from semantically secure encryption (Q1747662) (← links)
- IRIBE: intrusion-resilient identity-based encryption (Q1750529) (← links)
- Robust encryption (Q1753165) (← links)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (Q1791671) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN (Q1981773) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- A generic construction of CCA-secure deterministic encryption (Q2011031) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- Novel generic construction of leakage-resilient PKE scheme with CCA security (Q2035456) (← links)
- Revocable hierarchical identity-based encryption with adaptive security (Q2043020) (← links)
- Fully secure ABE with outsourced decryption against chosen ciphertext attack (Q2057133) (← links)
- An efficient CCA-secure access control encryption for any policy (Q2057135) (← links)
- Master-key KDM-secure ABE via predicate encoding (Q2061934) (← links)
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings (Q2061939) (← links)
- Wildcarded identity-based encryption from lattices (Q2067630) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- Chosen-ciphertext lattice-based public key encryption with equality test in standard model (Q2072076) (← links)
- A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\) (Q2089214) (← links)
- Access control encryption from group encryption (Q2117042) (← links)
- Lattice-based public-key encryption with equality test supporting flexible authorization in standard model (Q2166741) (← links)
- CPA-to-CCA transformation for KDM security (Q2175934) (← links)
- Forward-secure ID based digital signature scheme with forward-secure private key generator (Q2195298) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)