scientific article; zbMATH DE number 2009960

From MaRDI portal
Revision as of 04:33, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4434880

zbMath1037.68532MaRDI QIDQ4434880

Shai Halevi, Ran Canetti, Jonathan N. Katz

Publication date: 26 November 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560255.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

An efficient IBE scheme with tight security reduction in the random oracle modelSelf-updatable encryption with short public parameters and its extensionsPublic-Key Puncturable Encryption: Modular and Compact ConstructionsEfficient subtree-based encryption for fuzzy-entity data sharingCertifying trapdoor permutations, revisitedHIBE: Hierarchical Identity-Based EncryptionTightly secure signatures and public-key encryptionCertificateless signcryption scheme in the standard modelSemi-adaptive Security and Bundling Functionalities Made Generic and EasyFine-grained forward secrecy: allow-list/deny-list encryption and applicationsHow to construct secure proxy cryptosystemTowards Forward Security Properties for PEKS and IBERevocable hierarchical identity-based encryption with shorter private keys and update keysBatch verification of short signaturesIdentity-based encryption with hierarchical key-insulation in the standard modelForward-secure revocable identity-based encryptionAn identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystemTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionSpatial encryption supporting non-monotone access structureShorter identity-based encryption via asymmetric pairingsUnique-path identity based encryption with applications to strongly secure messagingForward-secure identity-based signature: security notions and constructionFormal Security Treatments for Signatures from Identity-Based EncryptionFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesFunctional encryption for computational hiding in prime order groups via pair encodingsForward-secure encryption with fast forwardingAttribute-Based Encryption with Partially Hidden Encryptor-Specified Access StructuresYou can sign but not decrypt: hierarchical integrated encryption and signatureOn secure ratcheting with immediate decryptionForward-secure ID based digital signature scheme with forward-secure private key generatorAttribute-based encryption schemes with constant-size ciphertextsHierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)Forward-secure public key encryption without key update from proof-of-stake blockchainIdentity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionA survey on functional encryptionForward-secure revocable secret handshakes from latticesNon-interactive zero-knowledge from non-interactive batch argumentsA note on non-interactive zero-knowledge from CDHA lattice-based forward secure IBE scheme for Internet of thingsRevocable hierarchical identity-based encryption via history-free approachPrivacy-preserving pattern matching on encrypted dataProvably-secure time-bound hierarchical key assignment schemesIncremental symmetric puncturable encryption with support for unbounded number of puncturesDisappearing cryptography in the bounded storage modelUpdatable public key encryption in the standard modelA formal security analysis of the Signal messaging protocolKDM security for identity-based encryption: constructions and separationsEfficient selective identity-based encryption without random oraclesIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysTrapdoor delegation and HIBE from middle-product LWE in standard modelFast, compact, and expressive attribute-based encryptionCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecurityA cryptographic analysis of the TLS 1.3 handshake protocolOne forward-secure signature scheme using bilinear maps and its applicationsSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyForward-secure identity-based encryption with direct chosen-ciphertext security in the standard modelNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemIRIBE: intrusion-resilient identity-based encryptionA new framework for the design and analysis of identity-based identification schemesDoubly spatial encryption from DBDHAttribute-Based Encryption with Fast DecryptionAnonymous HIBE with short ciphertexts: full security in prime order groupsEfficient hybrid encryption from ID-based encryptionPractical Identity-Based Encryption Without Random OraclesMulti-Identity Single-Key Decryption without Random OraclesProtecting against key-exposure: strongly key-insulated encryption with optimal thresholdRevocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short CiphertextsBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangeBandwidth-efficient attribute-based key-insulated signatures with message recoverySignatures in hierarchical certificateless cryptography: efficient constructions and provable securityAttribute-based key-insulated signature and its applicationsMulti-theorem preprocessing NIZKs from latticesIdentity-Based Threshold Key-Insulated Encryption without Random OraclesRevocable hierarchical identity-based encryption with adaptive securityMulti-identity management for identity-based cryptographyAdaptive-ID Secure Revocable Identity-Based EncryptionKey Insulation and Intrusion Resilience over a Public ChannelVerifiable random functions: relations to identity-based key encapsulation and new constructionsVerifiable Random Functions from Identity-Based Key EncapsulationCompact designated verifier NIZKs from the CDH assumption without pairingsSecret Handshakes with Dynamic Expressive Matching PolicyNew constructions of statistical NIZKs: dual-mode DV-NIZKs and moreNon-interactive zero knowledge from sub-exponential DDHSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsForward-Secure Group Signatures from PairingsFunctional encryption for set intersection in the multi-client settingAn efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystemCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user SettingNew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsSecure Hierarchical Identity Based Encryption Scheme in the Standard ModelA Fuzzy ID-Based Encryption Efficient When Error Rate Is LowEfficient and Provably Secure Certificateless Multi-receiver SigncryptionConstruction of Yet Another Forward Secure Signature Scheme Using Bilinear MapsSecure Key-Updating for Lazy RevocationComputing on authenticated dataPrivacy-preserving encryption scheme using DNA parentage testForward secure message franking0-RTT Key Exchange with Full Forward Secrecy




This page was built for publication: