Fine-grained forward secrecy: allow-list/deny-list encryption and applications
From MaRDI portal
Publication:2147256
DOI10.1007/978-3-662-64331-0_26zbMath1491.94045OpenAlexW3209262083MaRDI QIDQ2147256
Christoph Striecks, David Derler, Sebastian Ramacher, Daniel Slamanig
Publication date: 22 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-662-64331-0_26
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- Updating key size estimations for pairings
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Hierarchical ID-Based Cryptography
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Secure integration of asymmetric and symmetric encryption schemes
- Public-Key Puncturable Encryption: Modular and Compact Constructions
- 0-RTT Key Exchange with Full Forward Secrecy
- Watermarking cryptographic capabilities
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
This page was built for publication: Fine-grained forward secrecy: allow-list/deny-list encryption and applications