Identity-Based Encryption Secure against Selective Opening Attack
From MaRDI portal
Publication:3000542
DOI10.1007/978-3-642-19571-6_15zbMath1295.94020OpenAlexW65874733MaRDI QIDQ3000542
Brent Waters, Scott Yilek, Mihir Bellare
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_15
Related Items (20)
SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions ⋮ Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts ⋮ One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model ⋮ Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness ⋮ Simulation-based selective opening security for receivers under chosen-ciphertext attacks ⋮ Registered attribute-based encryption ⋮ Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions ⋮ Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting ⋮ Access control encryption with efficient verifiable sanitized decryption ⋮ Receiver selective opening security for identity-based encryption in the multi-challenge setting ⋮ The relation and transformation between hierarchical inner product encryption and spatial encryption ⋮ Efficient identity-based encryption with hierarchical key-insulation from HIBE ⋮ Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited ⋮ Practical public key encryption with selective opening security for receivers ⋮ Tightly Secure IBE Under Constant-Size Master Public Key ⋮ A multi-authority approach to various predicate encryption types ⋮ Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening ⋮ Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited ⋮ IBE with tight security against selective opening and chosen-ciphertext attacks ⋮ Identity-based broadcast encryption with continuous leakage resilience
This page was built for publication: Identity-Based Encryption Secure against Selective Opening Attack