Practical Identity-Based Encryption Without Random Oracles

From MaRDI portal
Revision as of 03:23, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3593111

DOI10.1007/11761679_27zbMath1140.94340OpenAlexW1546774120MaRDI QIDQ3593111

Craig Gentry

Publication date: 24 September 2007

Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11761679_27




Related Items (only showing first 100 items - show all)

An efficient IBE scheme with tight security reduction in the random oracle modelGeneric construction for tightly-secure signatures from discrete logEfficient subtree-based encryption for fuzzy-entity data sharingExtended dual system group and shorter unbounded hierarchical identity based encryptionPredicate encryption supporting disjunctions, polynomial equations, and inner productsImplementing secure reporting of sexual misconduct -- revisiting WhoTooSemi-adaptive Security and Bundling Functionalities Made Generic and EasyRegular lossy functions and their applications in leakage-resilient cryptographyAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceMemory lower bounds of reductions revisitedAnother step towards realizing random oracles: non-malleable point obfuscationAnonymous IBE, leakage resilience and circular security from new assumptionsAn Efficient and Provably Secure Certificate-Based Encryption SchemeChosen ciphertext secure keyed-homomorphic public-key cryptosystemsImproved Identity-Based Online/Offline EncryptionConstructions of CCA-Secure Revocable Identity-Based EncryptionAccountable identity-based encryption with distributed private key generatorsEfficient revocable identity-based encryption with short public parametersOn the power of rewinding simulators in functional encryptionReducing elliptic curve logarithms to logarithms in a finite fieldAdaptively secure certificate-based broadcast encryption and its application to cloud storage serviceProxy-invisible CCA-secure type-based proxy re-encryption without random oraclesTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessBroadcast encryption based non-interactive key distribution in MANETsBonsai trees, or how to delegate a lattice basisThe random oracle model: a twenty-year retrospectiveEfficient and fully secure lattice-based IBE with equality testForward-secure revocable identity-based encryptionEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsIterated Random Oracle: A Universal Approach for Finding Loss in Security ReductionShorter identity-based encryption via asymmetric pairingsFormal Security Treatments for Signatures from Identity-Based EncryptionGeneric constructions of identity-based and certificateless kEMsEfficient One-Round Key Exchange in the Standard ModelRelations between semantic security and anonymity in identity-based encryptionCryptanalysis of an identity based broadcast encryption scheme without random oraclesInner-product encryption under standard assumptionsAccess control encryption with efficient verifiable sanitized decryptionIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersAdaptively secure inner product encryption from LWEProgrammable hash functions and their applicationsAccountable authority key policy attribute-based encryptionRing-based identity based encryption -- asymptotically shorter MPK and tighter securityAdaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroupsNew Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public ParametersNew technique for chosen-ciphertext security based on non-interactive zero-knowledgeKDM security for identity-based encryption: constructions and separationsThe relation and transformation between hierarchical inner product encryption and spatial encryptionChosen ciphertext secure fuzzy identity based encryption without ROMGeneral Certificateless Encryption and Timed-Release EncryptionEfficient Certificate-Based Encryption in the Standard ModelEfficient selective identity-based encryption without random oraclesPublic key encryption with keyword search secure against keyword guessing attacks without random oracleForward-secure identity-based encryption with direct chosen-ciphertext security in the standard modelNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemIRIBE: intrusion-resilient identity-based encryptionRobust encryptionChosen Ciphertext Secure Keyed-Homomorphic Public-Key EncryptionRevocable Identity-Based Encryption Revisited: Security Model and ConstructionChosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchAnonymous HIBE with short ciphertexts: full security in prime order groupsFully secure functional encryption with a large class of relations from the decisional linear assumptionA Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast CommunicationRevocable hierarchical identity-based encryptionEfficient hybrid encryption from ID-based encryptionProgrammable Hash Functions and Their ApplicationsMulti-Identity Single-Key Decryption without Random OraclesSecurity and Anonymity of Identity-Based Encryption with Multiple Trusted AuthoritiesFully CCA2 secure identity based broadcast encryption without random oraclesIdentity-Based Online/Offline EncryptionA provably secure certificate-based encryption scheme against malicious CA attacks in the standard modelNovel updatable identity-based hash proof system and its applicationsAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyDéjà Q: Encore! Un Petit IBEFunctional Encryption Without ObfuscationNovel generic construction of leakage-resilient PKE scheme with CCA securityAdaptive-ID Secure Revocable Identity-Based EncryptionA variant of Boneh-Franklin IBE with a tight reduction in the random oracle modelVerifiable random functions: relations to identity-based key encapsulation and new constructionsAdaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE SchemeVerifiable Random Functions from Identity-Based Key EncapsulationOne-Round Strong Oblivious Signature-Based EnvelopeContent-Based EncryptionIdentity-Based Group EncryptionBuilding Key-Private Public-Key Encryption SchemesSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsCertified Encryption RevisitedEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceIdentity-based encryption with security against the KGC: a formal model and its instantiationsRevocable identity-based encryption with server-aided ciphertext evolutionProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesNew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsContinuous leakage-resilient identity-based encryption with leakage amplificationIBE with tight security against selective opening and chosen-ciphertext attacksEphemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments



Cites Work


This page was built for publication: Practical Identity-Based Encryption Without Random Oracles