scientific article; zbMATH DE number 2086699

From MaRDI portal
Revision as of 22:56, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4737236

zbMath1055.94012MaRDI QIDQ4737236

Shouhuai Xu, Yevgeniy Dodis, Jonathan N. Katz, Mordechai M. Yung

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320065.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Self-updatable encryption with short public parameters and its extensionsTwo-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MorePublic-Key Puncturable Encryption: Modular and Compact ConstructionsKey-insulated aggregate signatureCCA secure \textit{a posteriori} openable encryption in the standard modelAnonymous IBE, leakage resilience and circular security from new assumptionsEfficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic CurvesConstructions of CCA-Secure Revocable Identity-Based EncryptionDynamic collusion bounded functional encryption from identity-based encryptionOptimal bounded-collusion secure functional encryption\texttt{FlipIt}: the game of ``stealthy takeoverIdentity-based encryption with hierarchical key-insulation in the standard modelStrong key-insulated signature in the standard modelUnique-path identity based encryption with applications to strongly secure messagingCertificateless key-insulated signature without random oraclesCertificateless strong key-insulated signature without random oraclesAn Efficient Strong Key-Insulated Signature Scheme and Its ApplicationForward-secure encryption with fast forwardingAdaptive multiparty NIKEAn efficient threshold key-insulated signature schemeGeneric Construction of Bounded-Collusion IBE via Table-Based ID-to-Key MapEfficient identity-based encryption with hierarchical key-insulation from HIBEFunctional encryption for cubic polynomials and implementationOne forward-secure signature scheme using bilinear maps and its applicationsSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyForward-secure identity-based encryption with direct chosen-ciphertext security in the standard modelIRIBE: intrusion-resilient identity-based encryptionRevocable Identity-Based Encryption Revisited: Security Model and ConstructionBounded-Collusion Attribute-Based Encryption from Minimal AssumptionsRevocable hierarchical identity-based encryptionProtecting against key-exposure: strongly key-insulated encryption with optimal thresholdBandwidth-efficient attribute-based key-insulated signatures with message recoveryAttribute-based key-insulated signature and its applicationsScalable public-key tracing and revokingAn improved certificateless strong key-insulated signature scheme in the standard modelIdentity-Based Threshold Key-Insulated Encryption without Random OraclesKey Insulation and Intrusion Resilience over a Public ChannelVerifiable random functions: relations to identity-based key encapsulation and new constructionsLeakage Resilient Strong Key-Insulated Signatures in Public ChannelSome Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)Construction of Yet Another Forward Secure Signature Scheme Using Bilinear MapsSecure Key-Updating for Lazy Revocation