scientific article; zbMATH DE number 2009960
From MaRDI portal
Publication:4434880
zbMath1037.68532MaRDI QIDQ4434880
Shai Halevi, Ran Canetti, Jonathan N. Katz
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560255.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Self-updatable encryption with short public parameters and its extensions ⋮ Public-Key Puncturable Encryption: Modular and Compact Constructions ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Certifying trapdoor permutations, revisited ⋮ HIBE: Hierarchical Identity-Based Encryption ⋮ Tightly secure signatures and public-key encryption ⋮ Certificateless signcryption scheme in the standard model ⋮ Semi-adaptive Security and Bundling Functionalities Made Generic and Easy ⋮ Fine-grained forward secrecy: allow-list/deny-list encryption and applications ⋮ How to construct secure proxy cryptosystem ⋮ Towards Forward Security Properties for PEKS and IBE ⋮ Revocable hierarchical identity-based encryption with shorter private keys and update keys ⋮ Batch verification of short signatures ⋮ Identity-based encryption with hierarchical key-insulation in the standard model ⋮ Forward-secure revocable identity-based encryption ⋮ An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem ⋮ Towards Tightly Secure Lattice Short Signature and Id-Based Encryption ⋮ Spatial encryption supporting non-monotone access structure ⋮ Shorter identity-based encryption via asymmetric pairings ⋮ Unique-path identity based encryption with applications to strongly secure messaging ⋮ Forward-secure identity-based signature: security notions and construction ⋮ Formal Security Treatments for Signatures from Identity-Based Encryption ⋮ FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes ⋮ Functional encryption for computational hiding in prime order groups via pair encodings ⋮ Forward-secure encryption with fast forwarding ⋮ Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures ⋮ You can sign but not decrypt: hierarchical integrated encryption and signature ⋮ On secure ratcheting with immediate decryption ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds) ⋮ Forward-secure public key encryption without key update from proof-of-stake blockchain ⋮ Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption ⋮ A survey on functional encryption ⋮ Forward-secure revocable secret handshakes from lattices ⋮ Non-interactive zero-knowledge from non-interactive batch arguments ⋮ A note on non-interactive zero-knowledge from CDH ⋮ A lattice-based forward secure IBE scheme for Internet of things ⋮ Revocable hierarchical identity-based encryption via history-free approach ⋮ Privacy-preserving pattern matching on encrypted data ⋮ Provably-secure time-bound hierarchical key assignment schemes ⋮ Incremental symmetric puncturable encryption with support for unbounded number of punctures ⋮ Disappearing cryptography in the bounded storage model ⋮ Updatable public key encryption in the standard model ⋮ A formal security analysis of the Signal messaging protocol ⋮ KDM security for identity-based encryption: constructions and separations ⋮ Efficient selective identity-based encryption without random oracles ⋮ Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys ⋮ Trapdoor delegation and HIBE from middle-product LWE in standard model ⋮ Fast, compact, and expressive attribute-based encryption ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ One forward-secure signature scheme using bilinear maps and its applications ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model ⋮ New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem ⋮ IRIBE: intrusion-resilient identity-based encryption ⋮ A new framework for the design and analysis of identity-based identification schemes ⋮ Doubly spatial encryption from DBDH ⋮ Attribute-Based Encryption with Fast Decryption ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Efficient hybrid encryption from ID-based encryption ⋮ Practical Identity-Based Encryption Without Random Oracles ⋮ Multi-Identity Single-Key Decryption without Random Oracles ⋮ Protecting against key-exposure: strongly key-insulated encryption with optimal threshold ⋮ Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts ⋮ Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange ⋮ Bandwidth-efficient attribute-based key-insulated signatures with message recovery ⋮ Signatures in hierarchical certificateless cryptography: efficient constructions and provable security ⋮ Attribute-based key-insulated signature and its applications ⋮ Multi-theorem preprocessing NIZKs from lattices ⋮ Identity-Based Threshold Key-Insulated Encryption without Random Oracles ⋮ Revocable hierarchical identity-based encryption with adaptive security ⋮ Multi-identity management for identity-based cryptography ⋮ Adaptive-ID Secure Revocable Identity-Based Encryption ⋮ Key Insulation and Intrusion Resilience over a Public Channel ⋮ Verifiable random functions: relations to identity-based key encapsulation and new constructions ⋮ Verifiable Random Functions from Identity-Based Key Encapsulation ⋮ Compact designated verifier NIZKs from the CDH assumption without pairings ⋮ Secret Handshakes with Dynamic Expressive Matching Policy ⋮ New constructions of statistical NIZKs: dual-mode DV-NIZKs and more ⋮ Non-interactive zero knowledge from sub-exponential DDH ⋮ Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions ⋮ Forward-Secure Group Signatures from Pairings ⋮ Functional encryption for set intersection in the multi-client setting ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting ⋮ New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts ⋮ Secure Hierarchical Identity Based Encryption Scheme in the Standard Model ⋮ A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low ⋮ Efficient and Provably Secure Certificateless Multi-receiver Signcryption ⋮ Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps ⋮ Secure Key-Updating for Lazy Revocation ⋮ Computing on authenticated data ⋮ Privacy-preserving encryption scheme using DNA parentage test ⋮ Forward secure message franking ⋮ 0-RTT Key Exchange with Full Forward Secrecy
This page was built for publication: