Identity-Based Encryption Gone Wild
From MaRDI portal
Publication:3591437
DOI10.1007/11787006_26zbMath1133.94340OpenAlexW2171440248MaRDI QIDQ3591437
Dario Catalano, John Malone-Lee, Gregory Neven, Michel Abdalla, Alexander W. Dent, Nigel P. Smart
Publication date: 11 September 2007
Published in: Automata, Languages and Programming (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-774.pdf
Related Items (21)
Extensions of IBE and Related Primitives ⋮ Attribute-Based Broadcast Encryption Scheme Made Efficient ⋮ Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures ⋮ Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding ⋮ (Augmented) broadcast encryption from identity based encryption with wildcard ⋮ Wildcarded identity-based encryption ⋮ Programmable hash functions and their applications ⋮ IDPM: An Improved Degenerate Pattern Matching Algorithm for Biological Sequences ⋮ Improved (Hierarchical) Inner-Product Encryption from Lattices ⋮ Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? ⋮ Tracing Malicious Proxies in Proxy Re-encryption ⋮ Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme ⋮ Edit Distance Based Encryption and Its Application ⋮ Identity-Based Trace and Revoke Schemes ⋮ Beta Weil pairing revisited ⋮ Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security ⋮ Privacy-Aware Attribute-Based Encryption with User Accountability ⋮ Wildcarded identity-based encryption from lattices ⋮ Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting ⋮ Adequate Elliptic Curves for Computing the Product of n Pairings ⋮ Formal Language Identity-based Cryptography
This page was built for publication: Identity-Based Encryption Gone Wild