Efficient Identity-Based Encryption Without Random Oracles

From MaRDI portal
Revision as of 00:58, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5385725

DOI10.1007/11426639_7zbMath1137.94360OpenAlexW1592092778MaRDI QIDQ5385725

Brent Waters

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_7




Related Items (only showing first 100 items - show all)

Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast DecryptionGeneric Constructions of Revocable Identity-Based EncryptionHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreA more efficient accountable authority IBE scheme under the DL assumptionBoneh-Boyen IBEHierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data SharingNew Proof for BKP IBE Scheme and Improvement in the MIMC SettingRecovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor FunctionsImplicit Zero-Knowledge Arguments and Applications to the Malicious SettingShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsSemi-adaptive Security and Bundling Functionalities Made Generic and EasyIBE Under $$k$$-LIN with Shorter Ciphertexts and Private KeysConstructions of CCA-Secure Revocable Identity-Based EncryptionReducing elliptic curve logarithms to logarithms in a finite fieldPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsIterated Random Oracle: A Universal Approach for Finding Loss in Security ReductionConstruction of a Hybrid HIBE Protocol Secure Against Adaptive AttacksA CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash FunctionPractical Threshold Signatures Without Random OraclesFormal Security Treatments for Signatures from Identity-Based EncryptionTraceable Identity-Based Group SignatureAn Efficient and Provable Secure Identity-Based Identification Scheme in the Standard ModelThe Kernel Matrix Diffie-Hellman AssumptionCryptographic Reverse Firewall via Malleable Smooth Projective Hash FunctionsEfficient One-Round Key Exchange in the Standard ModelNew Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public ParametersCertificate-Based Signature Schemes without Pairings or Random OraclesIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysBlind Identity-Based Encryption and Simulatable Oblivious TransferTwo Efficient Tag-Based Encryption Schemes on LatticesNew Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard ModelSecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based EncryptionA Signature Scheme with Efficient Proof of ValidityCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecurityRevocable Attribute-Based Signatures with Adaptive Security in the Standard ModelRevocable Identity-Based Encryption Revisited: Security Model and ConstructionImproved (Hierarchical) Inner-Product Encryption from LatticesEfficient UC-Secure Authenticated Key-Exchange for Algebraic LanguagesEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESSequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation StudiesEfficient Certificateless KEM in the Standard ModelFactor-4 and 6 compression of cyclotomic subgroups of andTightly Secure IBE Under Constant-Size Master Public KeyCompact Group Signatures Without Random OraclesPractical Identity-Based Encryption Without Random OraclesSequential Aggregate Signatures and Multisignatures Without Random OraclesProgrammable Hash Functions and Their ApplicationsUnlinkable Randomizable Signature and Its Application in Group SignatureMulti-Identity Single-Key Decryption without Random OraclesTracing Malicious Proxies in Proxy Re-encryptionIdentity-Based Online/Offline EncryptionUnidirectional Chosen-Ciphertext Secure Proxy Re-encryptionVerifiable random functions from non-interactive witness-indistinguishable proofsGeneric constructions of integrated PKE and PEKSTighter security proofs for GPV-IBE in the quantum random oracle modelProxy Re-signature Schemes Without Random OraclesA Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption PowerMutative Identity-Based Signatures or Dynamic Credentials Without Random OraclesAttribute-Based SignaturesIdentity-Based Threshold Key-Insulated Encryption without Random OraclesCCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric EncryptionMulti-identity management for identity-based cryptographyAdaptive-ID Secure Revocable Identity-Based EncryptionAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsPractical Short Signature Batch VerificationBreaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive OpeningTightly secure hierarchical identity-based encryptionRealizing Hash-and-Sign Signatures under Standard AssumptionsSimulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE SchemeVerifiable Random Functions from Identity-Based Key EncapsulationBuilding Key-Private Public-Key Encryption SchemesAn efficient certificateless multi-receiver threshold decryption schemeOn the Theoretical Gap between Group Signatures with and without UnlinkabilityCertified Encryption RevisitedThreshold Attribute-Based Signatures and Their Application to Anonymous Credential SystemsAnonymity from Public Key Encryption to Undeniable SignaturesVerifiable Security of Boneh-Franklin Identity-Based EncryptionEfficient Identity-Based Signcryption in the Standard ModelSecure Obfuscation of Encrypted Verifiable Encrypted SignaturesIdentity-Based Trace and Revoke SchemesSecurity of Verifiably Encrypted Signatures and a Construction without Random OraclesProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesIdentity Based Group Signatures from Hierarchical Identity-Based EncryptionForward-Secure Group Signatures from PairingsEfficient Traceable Signatures in the Standard ModelIdentity-Based Combined Public Key Schemes for Signature, Encryption, and SigncryptionNew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsConcise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short ProofsSanitizable Signatures RevisitedSecure Hierarchical Identity Based Encryption Scheme in the Standard ModelToward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based SignaturesOptimal Online/Offline Signature: How to Sign a Message without Online ComputationRound-Optimal Blind Signatures from Waters SignaturesSecure Proxy Multi-signature Scheme in the Standard ModelServer-Aided Verification Signatures: Definitions and New ConstructionsAdequate Elliptic Curves for Computing the Product of n Pairings







This page was built for publication: Efficient Identity-Based Encryption Without Random Oracles