Hierarchical Identity Based Encryption with Constant Size Ciphertext

From MaRDI portal
Revision as of 01:58, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5385744


DOI10.1007/11426639_26zbMath1137.94340MaRDI QIDQ5385744

Dan Boneh, Xavier Boyen, Eu-Jin Goh

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_26


94A60: Cryptography


Related Items

Efficient Broadcast Encryption with Personalized Messages, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time, Multi-key Hierarchical Identity-Based Signatures, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption, Secure Hierarchical Identity Based Encryption Scheme in the Standard Model, A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low, Discrete logarithm problems with auxiliary inputs, New constructions for provably-secure time-bound hierarchical key assignment schemes, Fully CCA2 secure identity based broadcast encryption without random oracles, Extensions of access structures and their cryptographic applications, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles, How to construct secure proxy cryptosystem, Survey of information security, All-in-one group-oriented cryptosystem based on bilinear pairing, Identity Based Group Signatures from Hierarchical Identity-Based Encryption, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs, Efficiency Limitations for Σ-Protocols for Group Homomorphisms, Implementing broadcast encryption scheme using bilinear map and group characteristic, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, Attribute-Based Broadcast Encryption Scheme Made Efficient, General Certificateless Encryption and Timed-Release Encryption, An Identity-Based Key Agreement Protocol for the Network Layer, Proxy Re-signatures in the Standard Model, Security Analysis of the Strong Diffie-Hellman Problem, Practical Identity-Based Encryption Without Random Oracles, Multi-Identity Single-Key Decryption without Random Oracles, Generalized Identity Based and Broadcast Encryption Schemes, Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems, Tracing Malicious Proxies in Proxy Re-encryption, Multi-identity management for identity-based cryptography, Asymmetric Group Key Agreement, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Verifiable Random Functions from Identity-Based Key Encapsulation