Fully, (Almost) Tightly Secure IBE and Dual System Groups

From MaRDI portal
Revision as of 19:22, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2849411

DOI10.1007/978-3-642-40084-1_25zbMath1311.94072OpenAlexW148801026MaRDI QIDQ2849411

Hoeteck Wee, Jie Chen

Publication date: 17 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_25




Related Items (66)

An efficient IBE scheme with tight security reduction in the random oracle modelMaster-Key KDM-Secure IBE from PairingsHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreEfficient subtree-based encryption for fuzzy-entity data sharingOn the security loss of unique signaturesQuantum algorithms for the \(k\)-XOR problemExtended dual system group and shorter unbounded hierarchical identity based encryptionFine-grained secure attribute-based encryptionNew Proof for BKP IBE Scheme and Improvement in the MIMC SettingCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionBilinear Entropy Expansion from the Decisional Linear AssumptionUnbounded ABE via bilinear entropy expansion, revisitedIBE Under $$k$$-LIN with Shorter Ciphertexts and Private KeysEfficient revocable identity-based encryption with short public parametersAttribute based encryption for deterministic finite automata from DLINShort signatures from Diffie-Hellman: realizing almost compact public keyTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessBlind key-generation attribute-based encryption for general predicatesDigital Signatures with Memory-Tight Security in the Multi-challenge SettingA generic construction of tightly secure signatures in the multi-user settingCompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceA practical compiler for attribute-based encryption: new decentralized constructions and moreAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelFine-grained verifier NIZK and its applicationsIdentity-based encryption in DDH hard groupsFunctional encryption for computational hiding in prime order groups via pair encodingsLattice-based signatures with tight adaptive corruptions and moreCompact and tightly selective-opening secure public-key encryption schemesIdentity-based matchmaking encryption from standard assumptionsA survey on functional encryptionEfficient authentication from hard learning problemsIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingUnbounded HIBE with tight securitySimple and more efficient PRFs with tight security from LWE and matrix-DDHExpanded Framework for Dual System Encryption and Its ApplicationTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingTightly secure inner product functional encryption: multi-input and function-hiding constructionsTightly secure ring signatures in the standard modelNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsCompact structure-preserving signatures with almost tight securityTightly Secure IBE Under Constant-Size Master Public KeyFine-grained secure attribute-based encryptionBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangeAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyA Study of Pair Encodings: Predicate Encryption in Prime Order GroupsTighter security proofs for GPV-IBE in the quantum random oracle modelFully Secure IBE with Tighter Reduction in Prime Order Bilinear GroupsA multi-authority approach to various predicate encryption typesTag-based ABE in prime-order groups via pair encodingTightly secure hierarchical identity-based encryptionVerifiable random functions with optimal tightnessGeneric negation of pair encodingsA Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order GroupsIBE with tight security against selective opening and chosen-ciphertext attacksShort tightly secure signatures for signing a vector of group elements: a new approachTightly secure signature schemes from the LWE and subset sum assumptionsAdaptive PartitioningShort identity-based signatures with tight security from lattices






This page was built for publication: Fully, (Almost) Tightly Secure IBE and Dual System Groups