Anonymous and leakage resilient IBE and IPE (Q2407713): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: Charm / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-016-0303-7 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2549537796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Lattice (H)IBE in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption for Inner Product Predicates from Learning with Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Survey: Leakage Resilience and the Bounded Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short signatures from the Weil pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conjunctive, Subset, and Range Queries on Encrypted Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bonsai Trees, or How to Delegate a Lattice Basis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption Schemes with Auxiliary Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Storing Secrets on Continually Leaky Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programmable hash functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage Resilient IBE and IPE under the DLIN Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leak on key updates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Achieving Leakage Resilience through Dual System Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuous leakage-resilient certificate-based encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4788557 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption Resilient to Continual Auxiliary Leakage / rank
 
Normal rank

Latest revision as of 11:56, 14 July 2024

scientific article
Language Label Description Also known as
English
Anonymous and leakage resilient IBE and IPE
scientific article

    Statements

    Anonymous and leakage resilient IBE and IPE (English)
    0 references
    0 references
    0 references
    6 October 2017
    0 references
    identity-based encryption
    0 references
    inner product encryption
    0 references
    leakage resilience
    0 references
    anonymity
    0 references
    0 references
    0 references
    0 references

    Identifiers