Hierarchical Identity Based Encryption with Constant Size Ciphertext

From MaRDI portal
Revision as of 00:58, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5385744

DOI10.1007/11426639_26zbMath1137.94340OpenAlexW2116556172MaRDI QIDQ5385744

Dan Boneh, Xavier Boyen, Eu-Jin Goh

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_26




Related Items (only showing first 100 items - show all)

Generic Constructions of Revocable Identity-Based EncryptionShort Attribute-Based Signatures for Threshold PredicatesImplementing broadcast encryption scheme using bilinear map and group characteristicHIBE: Hierarchical Identity-Based EncryptionA New Functional Encryption for Multidimensional Range Query (Short Paper)Generic Framework for Attribute-Based Group SignatureA Practical Leakage-Resilient Signature Scheme in the Generic Group ModelShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsLeakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityThe One-More Discrete Logarithm Assumption in the Generic Group ModelHierarchical identity-based inner product functional encryptionDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsA Shuffle Argument Secure in the Generic ModelCiphertext-Policy Attribute Based Encryption Supporting Access Policy UpdateOblivious Keyword Search with AuthorizationA practical compiler for attribute-based encryption: new decentralized constructions and moreUnique-path identity based encryption with applications to strongly secure messagingConstruction of a Hybrid HIBE Protocol Secure Against Adaptive AttacksDecentralized multi-authority attribute-based inner-product FE: large universe and unboundedGLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offsOn the security of functional encryption in the generic group modelElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyFully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile CommunicationsTinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networksConstructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key FrameworkForward-secure encryption with fast forwardingAttribute-Based Broadcast Encryption Scheme Made EfficientMulti random projection inner product encryption, applications to proximity searchable encryption for the iris biometricTrapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hidingRedeeming reset indifferentiability and applications to post-quantum securityA survey on functional encryptionForward-secure revocable secret handshakes from latticesThe price of verifiability: lower bounds for verifiable random functionsBeyond Uber: instantiating generic groups via PGGsPointProofs, revisitedA lattice-based forward secure IBE scheme for Internet of thingsHierarchical and non-monotonic key-policy attribute-based encryption and its applicationAdaptively Secure Broadcast Encryption with DealershipGeneral Certificateless Encryption and Timed-Release EncryptionAn Identity-Based Key Agreement Protocol for the Network LayerProxy Re-signatures in the Standard ModelIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysSecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based EncryptionCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecurityLeakage-Resilient Revocable Identity-Based Signature with Cloud Revocation AuthorityAttribute-Based Encryption with Fast DecryptionAnalysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputsOn Removing Graded Encodings from Functional EncryptionEfficient Broadcast Encryption with Personalized MessagesSecurity Analysis of the Strong Diffie-Hellman ProblemPractical Identity-Based Encryption Without Random OraclesMulti-Identity Single-Key Decryption without Random OraclesGeneralized Identity Based and Broadcast Encryption SchemesSufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH ProblemsTracing Malicious Proxies in Proxy Re-encryptionBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangePublic Key Broadcast Encryption with Low Number of Keys and Constant Decryption TimeMulti-key Hierarchical Identity-Based SignaturesDiscrete logarithm problems with auxiliary inputsFunctional Encryption for Cascade Automata (Extended Abstract)CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric EncryptionMulti-identity management for identity-based cryptographyAsymmetric Group Key AgreementAdaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)Verifiable Random Functions from Identity-Based Key EncapsulationDMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User RevocationEfficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-CostFully Distributed Broadcast EncryptionAnonymous Encryption with Partial-Order Subset Delegation FunctionalityIdentity-Based Trace and Revoke SchemesIdentity Based Group Signatures from Hierarchical Identity-Based EncryptionNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user SettingDesignated Confirmer Signatures with Unified VerificationNew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsConcise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short ProofsEfficiency Limitations for Σ-Protocols for Group HomomorphismsEfficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast EncryptionSecure Hierarchical Identity Based Encryption Scheme in the Standard ModelA Fuzzy ID-Based Encryption Efficient When Error Rate Is LowCompact hierarchical identity-based encryption based on a harder decisional problemUnnamed ItemAdequate Elliptic Curves for Computing the Product of n PairingsAuthenticated asymmetric group key agreement based on certificateless cryptosystem0-RTT Key Exchange with Full Forward SecrecyAn efficient IBE scheme with tight security reduction in the random oracle modelSelf-updatable encryption with short public parameters and its extensionsA bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryptionEfficient subtree-based encryption for fuzzy-entity data sharingGeneralized closest substring encryptionExtended dual system group and shorter unbounded hierarchical identity based encryptionPredicate encryption supporting disjunctions, polynomial equations, and inner productsRevocable policy-based chameleon hashFine-grained forward secrecy: allow-list/deny-list encryption and applicationsHow to construct secure proxy cryptosystemSurvey of information securitySkipping the \(q\) in group signaturesOn the security of two identity-based conditional proxy re-encryption schemesA unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes







This page was built for publication: Hierarchical Identity Based Encryption with Constant Size Ciphertext