Identity-Based Encryption Secure against Selective Opening Attack

From MaRDI portal
Revision as of 21:10, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3000542

DOI10.1007/978-3-642-19571-6_15zbMath1295.94020OpenAlexW65874733MaRDI QIDQ3000542

Brent Waters, Scott Yilek, Mihir Bellare

Publication date: 19 May 2011

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_15




Related Items (20)

SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessSimulation-based selective opening security for receivers under chosen-ciphertext attacksRegistered attribute-based encryptionDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingAccess control encryption with efficient verifiable sanitized decryptionReceiver selective opening security for identity-based encryption in the multi-challenge settingThe relation and transformation between hierarchical inner product encryption and spatial encryptionEfficient identity-based encryption with hierarchical key-insulation from HIBESender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks RevisitedPractical public key encryption with selective opening security for receiversTightly Secure IBE Under Constant-Size Master Public KeyA multi-authority approach to various predicate encryption typesPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningSender-equivocable encryption schemes secure against chosen-ciphertext attacks revisitedIBE with tight security against selective opening and chosen-ciphertext attacksIdentity-based broadcast encryption with continuous leakage resilience




This page was built for publication: Identity-Based Encryption Secure against Selective Opening Attack