Hierarchical Identity Based Encryption with Constant Size Ciphertext
From MaRDI portal
Publication:5385744
DOI10.1007/11426639_26zbMath1137.94340OpenAlexW2116556172MaRDI QIDQ5385744
Dan Boneh, Xavier Boyen, Eu-Jin Goh
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11426639_26
Related Items (only showing first 100 items - show all)
Generic Constructions of Revocable Identity-Based Encryption ⋮ Short Attribute-Based Signatures for Threshold Predicates ⋮ Implementing broadcast encryption scheme using bilinear map and group characteristic ⋮ HIBE: Hierarchical Identity-Based Encryption ⋮ A New Functional Encryption for Multidimensional Range Query (Short Paper) ⋮ Generic Framework for Attribute-Based Group Signature ⋮ A Practical Leakage-Resilient Signature Scheme in the Generic Group Model ⋮ Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions ⋮ Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority ⋮ The One-More Discrete Logarithm Assumption in the Generic Group Model ⋮ Hierarchical identity-based inner product functional encryption ⋮ Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions ⋮ Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps ⋮ A Shuffle Argument Secure in the Generic Model ⋮ Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update ⋮ Oblivious Keyword Search with Authorization ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ Unique-path identity based encryption with applications to strongly secure messaging ⋮ Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks ⋮ Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded ⋮ GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs ⋮ On the security of functional encryption in the generic group model ⋮ Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey ⋮ Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications ⋮ TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks ⋮ Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework ⋮ Forward-secure encryption with fast forwarding ⋮ Attribute-Based Broadcast Encryption Scheme Made Efficient ⋮ Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric ⋮ Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding ⋮ Redeeming reset indifferentiability and applications to post-quantum security ⋮ A survey on functional encryption ⋮ Forward-secure revocable secret handshakes from lattices ⋮ The price of verifiability: lower bounds for verifiable random functions ⋮ Beyond Uber: instantiating generic groups via PGGs ⋮ PointProofs, revisited ⋮ A lattice-based forward secure IBE scheme for Internet of things ⋮ Hierarchical and non-monotonic key-policy attribute-based encryption and its application ⋮ Adaptively Secure Broadcast Encryption with Dealership ⋮ General Certificateless Encryption and Timed-Release Encryption ⋮ An Identity-Based Key Agreement Protocol for the Network Layer ⋮ Proxy Re-signatures in the Standard Model ⋮ Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys ⋮ SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority ⋮ Attribute-Based Encryption with Fast Decryption ⋮ Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs ⋮ On Removing Graded Encodings from Functional Encryption ⋮ Efficient Broadcast Encryption with Personalized Messages ⋮ Security Analysis of the Strong Diffie-Hellman Problem ⋮ Practical Identity-Based Encryption Without Random Oracles ⋮ Multi-Identity Single-Key Decryption without Random Oracles ⋮ Generalized Identity Based and Broadcast Encryption Schemes ⋮ Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems ⋮ Tracing Malicious Proxies in Proxy Re-encryption ⋮ Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange ⋮ Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time ⋮ Multi-key Hierarchical Identity-Based Signatures ⋮ Discrete logarithm problems with auxiliary inputs ⋮ Functional Encryption for Cascade Automata (Extended Abstract) ⋮ CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption ⋮ Multi-identity management for identity-based cryptography ⋮ Asymmetric Group Key Agreement ⋮ Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) ⋮ Verifiable Random Functions from Identity-Based Key Encapsulation ⋮ DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation ⋮ Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost ⋮ Fully Distributed Broadcast Encryption ⋮ Anonymous Encryption with Partial-Order Subset Delegation Functionality ⋮ Identity-Based Trace and Revoke Schemes ⋮ Identity Based Group Signatures from Hierarchical Identity-Based Encryption ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting ⋮ Designated Confirmer Signatures with Unified Verification ⋮ New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts ⋮ Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs ⋮ Efficiency Limitations for Σ-Protocols for Group Homomorphisms ⋮ Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption ⋮ Secure Hierarchical Identity Based Encryption Scheme in the Standard Model ⋮ A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low ⋮ Compact hierarchical identity-based encryption based on a harder decisional problem ⋮ Unnamed Item ⋮ Adequate Elliptic Curves for Computing the Product of n Pairings ⋮ Authenticated asymmetric group key agreement based on certificateless cryptosystem ⋮ 0-RTT Key Exchange with Full Forward Secrecy ⋮ An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Self-updatable encryption with short public parameters and its extensions ⋮ A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Generalized closest substring encryption ⋮ Extended dual system group and shorter unbounded hierarchical identity based encryption ⋮ Predicate encryption supporting disjunctions, polynomial equations, and inner products ⋮ Revocable policy-based chameleon hash ⋮ Fine-grained forward secrecy: allow-list/deny-list encryption and applications ⋮ How to construct secure proxy cryptosystem ⋮ Survey of information security ⋮ Skipping the \(q\) in group signatures ⋮ On the security of two identity-based conditional proxy re-encryption schemes ⋮ A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes
This page was built for publication: Hierarchical Identity Based Encryption with Constant Size Ciphertext