scientific article; zbMATH DE number 2086699
From MaRDI portal
Publication:4737236
zbMath1055.94012MaRDI QIDQ4737236
Shouhuai Xu, Yevgeniy Dodis, Jonathan N. Katz, Mordechai M. Yung
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320065.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Self-updatable encryption with short public parameters and its extensions ⋮ Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More ⋮ Public-Key Puncturable Encryption: Modular and Compact Constructions ⋮ Key-insulated aggregate signature ⋮ CCA secure \textit{a posteriori} openable encryption in the standard model ⋮ Anonymous IBE, leakage resilience and circular security from new assumptions ⋮ Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves ⋮ Constructions of CCA-Secure Revocable Identity-Based Encryption ⋮ Dynamic collusion bounded functional encryption from identity-based encryption ⋮ Optimal bounded-collusion secure functional encryption ⋮ \texttt{FlipIt}: the game of ``stealthy takeover ⋮ Identity-based encryption with hierarchical key-insulation in the standard model ⋮ Strong key-insulated signature in the standard model ⋮ Unique-path identity based encryption with applications to strongly secure messaging ⋮ Certificateless key-insulated signature without random oracles ⋮ Certificateless strong key-insulated signature without random oracles ⋮ An Efficient Strong Key-Insulated Signature Scheme and Its Application ⋮ Forward-secure encryption with fast forwarding ⋮ Adaptive multiparty NIKE ⋮ An efficient threshold key-insulated signature scheme ⋮ Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map ⋮ Efficient identity-based encryption with hierarchical key-insulation from HIBE ⋮ Functional encryption for cubic polynomials and implementation ⋮ One forward-secure signature scheme using bilinear maps and its applications ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model ⋮ IRIBE: intrusion-resilient identity-based encryption ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions ⋮ Revocable hierarchical identity-based encryption ⋮ Protecting against key-exposure: strongly key-insulated encryption with optimal threshold ⋮ Bandwidth-efficient attribute-based key-insulated signatures with message recovery ⋮ Attribute-based key-insulated signature and its applications ⋮ Scalable public-key tracing and revoking ⋮ An improved certificateless strong key-insulated signature scheme in the standard model ⋮ Identity-Based Threshold Key-Insulated Encryption without Random Oracles ⋮ Key Insulation and Intrusion Resilience over a Public Channel ⋮ Verifiable random functions: relations to identity-based key encapsulation and new constructions ⋮ Leakage Resilient Strong Key-Insulated Signatures in Public Channel ⋮ Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk) ⋮ Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps ⋮ Secure Key-Updating for Lazy Revocation