Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
From MaRDI portal
Publication:2953791
DOI10.1007/978-3-662-53890-6_21zbMath1407.94111MaRDI QIDQ2953791
Jie Chen, Junqing Gong, Zhen Fu Cao, Xiao-lei Dong
Publication date: 6 January 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_21
identity based encryption; tight security; prime-order bilinear group; multi-challenge setting; Groth-Sahai proof system; (weak) anonymity; nested dual system group
94A60: Cryptography
Related Items
Tightly Secure IBE Under Constant-Size Master Public Key, Unbounded ABE via bilinear entropy expansion, revisited, Improved inner-product encryption with adaptive security and full attribute-hiding
Cites Work
- Unnamed Item
- Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography
- Extended Nested Dual System Groups, Revisited
- A Framework for Identity-Based Encryption with Almost Tight Security
- Compactly Hiding Linear Spans
- Tightly CCA-Secure Encryption Without Pairings
- More Efficient Constructions for Inner-Product Encryption
- An Algebraic Framework for Diffie-Hellman Assumptions
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
- Efficient (Anonymous) Compact HIBE from Standard Assumptions
- Quasi-Adaptive NIZK for Linear Subspaces Revisited
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
- Identity-Based Cryptosystems and Signature Schemes
- Number-theoretic constructions of efficient pseudo-random functions
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Practical Identity-Based Encryption Without Random Oracles
- Efficient Noninteractive Proof Systems for Bilinear Groups
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
- Dual System Encryption via Predicate Encodings