Practical Identity-Based Encryption Without Random Oracles
From MaRDI portal
Publication:3593111
DOI10.1007/11761679_27zbMath1140.94340OpenAlexW1546774120MaRDI QIDQ3593111
Publication date: 24 September 2007
Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11761679_27
Related Items (only showing first 100 items - show all)
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Generic construction for tightly-secure signatures from discrete log ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Extended dual system group and shorter unbounded hierarchical identity based encryption ⋮ Predicate encryption supporting disjunctions, polynomial equations, and inner products ⋮ Implementing secure reporting of sexual misconduct -- revisiting WhoToo ⋮ Semi-adaptive Security and Bundling Functionalities Made Generic and Easy ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Memory lower bounds of reductions revisited ⋮ Another step towards realizing random oracles: non-malleable point obfuscation ⋮ Anonymous IBE, leakage resilience and circular security from new assumptions ⋮ An Efficient and Provably Secure Certificate-Based Encryption Scheme ⋮ Chosen ciphertext secure keyed-homomorphic public-key cryptosystems ⋮ Improved Identity-Based Online/Offline Encryption ⋮ Constructions of CCA-Secure Revocable Identity-Based Encryption ⋮ Accountable identity-based encryption with distributed private key generators ⋮ Efficient revocable identity-based encryption with short public parameters ⋮ On the power of rewinding simulators in functional encryption ⋮ Reducing elliptic curve logarithms to logarithms in a finite field ⋮ Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles ⋮ Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness ⋮ Broadcast encryption based non-interactive key distribution in MANETs ⋮ Bonsai trees, or how to delegate a lattice basis ⋮ The random oracle model: a twenty-year retrospective ⋮ Efficient and fully secure lattice-based IBE with equality test ⋮ Forward-secure revocable identity-based encryption ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ Towards Tightly Secure Lattice Short Signature and Id-Based Encryption ⋮ Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting ⋮ Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps ⋮ Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction ⋮ Shorter identity-based encryption via asymmetric pairings ⋮ Formal Security Treatments for Signatures from Identity-Based Encryption ⋮ Generic constructions of identity-based and certificateless kEMs ⋮ Efficient One-Round Key Exchange in the Standard Model ⋮ Relations between semantic security and anonymity in identity-based encryption ⋮ Cryptanalysis of an identity based broadcast encryption scheme without random oracles ⋮ Inner-product encryption under standard assumptions ⋮ Access control encryption with efficient verifiable sanitized decryption ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ Adaptively secure inner product encryption from LWE ⋮ Programmable hash functions and their applications ⋮ Accountable authority key policy attribute-based encryption ⋮ Ring-based identity based encryption -- asymptotically shorter MPK and tighter security ⋮ Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups ⋮ New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters ⋮ New technique for chosen-ciphertext security based on non-interactive zero-knowledge ⋮ KDM security for identity-based encryption: constructions and separations ⋮ The relation and transformation between hierarchical inner product encryption and spatial encryption ⋮ Chosen ciphertext secure fuzzy identity based encryption without ROM ⋮ General Certificateless Encryption and Timed-Release Encryption ⋮ Efficient Certificate-Based Encryption in the Standard Model ⋮ Efficient selective identity-based encryption without random oracles ⋮ Public key encryption with keyword search secure against keyword guessing attacks without random oracle ⋮ Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model ⋮ New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem ⋮ IRIBE: intrusion-resilient identity-based encryption ⋮ Robust encryption ⋮ Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication ⋮ Revocable hierarchical identity-based encryption ⋮ Efficient hybrid encryption from ID-based encryption ⋮ Programmable Hash Functions and Their Applications ⋮ Multi-Identity Single-Key Decryption without Random Oracles ⋮ Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities ⋮ Fully CCA2 secure identity based broadcast encryption without random oracles ⋮ Identity-Based Online/Offline Encryption ⋮ A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography ⋮ Déjà Q: Encore! Un Petit IBE ⋮ Functional Encryption Without Obfuscation ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security ⋮ Adaptive-ID Secure Revocable Identity-Based Encryption ⋮ A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model ⋮ Verifiable random functions: relations to identity-based key encapsulation and new constructions ⋮ Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) ⋮ Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme ⋮ Verifiable Random Functions from Identity-Based Key Encapsulation ⋮ One-Round Strong Oblivious Signature-Based Envelope ⋮ Content-Based Encryption ⋮ Identity-Based Group Encryption ⋮ Building Key-Private Public-Key Encryption Schemes ⋮ Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions ⋮ Certified Encryption Revisited ⋮ Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance ⋮ Identity-based encryption with security against the KGC: a formal model and its instantiations ⋮ Revocable identity-based encryption with server-aided ciphertext evolution ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Direct chosen-ciphertext secure identity-based key encapsulation without random oracles ⋮ New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ IBE with tight security against selective opening and chosen-ciphertext attacks ⋮ Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Hierarchical ID-Based Cryptography
- Efficient Construction of (Distributed) Verifiable Random Functions
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Topics in Cryptology – CT-RSA 2005
- Public Key Cryptography - PKC 2005
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: Practical Identity-Based Encryption Without Random Oracles