A Framework for Identity-Based Encryption with Almost Tight Security

From MaRDI portal
Revision as of 17:33, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2811145

DOI10.1007/978-3-662-48797-6_22zbMath1380.94069OpenAlexW2295458626MaRDI QIDQ2811145

Shota Yamada, Goichiro Hanaoka, Nuttapong Attrapadung

Publication date: 10 June 2016

Published in: Advances in Cryptology -- ASIACRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-48797-6_22




Related Items (22)

Master-Key KDM-Secure IBE from PairingsHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreNew Proof for BKP IBE Scheme and Improvement in the MIMC SettingGeneric constructions for fully secure revocable attribute-based encryptionTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsGeneric constructions of master-key KDM secure attribute-based encryptionIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingUnbounded HIBE with tight securityTightly CCA-secure encryption scheme in a multi-user setting with corruptionsTightly secure inner product functional encryption: multi-input and function-hiding constructionsCompact structure-preserving signatures with almost tight securityTightly Secure IBE Under Constant-Size Master Public KeyTighter security proofs for GPV-IBE in the quantum random oracle modelMaster-key KDM-secure ABE via predicate encodingEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceIBE with tight security against selective opening and chosen-ciphertext attacksShort tightly secure signatures for signing a vector of group elements: a new approachAdaptive Partitioning







This page was built for publication: A Framework for Identity-Based Encryption with Almost Tight Security