Chosen‐Ciphertext Security from Identity‐Based Encryption
From MaRDI portal
Publication:5422487
DOI10.1137/S009753970544713XzbMath1138.94010OpenAlexW1973801321WikidataQ121818957 ScholiaQ121818957MaRDI QIDQ5422487
Dan Boneh, Ran Canetti, Shai Halevi, Jonathan N. Katz
Publication date: 22 October 2007
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1137/s009753970544713x
Related Items (69)
Standard model leakage-resilient authenticated key exchange using inner-product extractors ⋮ Relations between robustness and RKA security under public-key encryption ⋮ Verifiable Inner Product Encryption Scheme ⋮ Trapdoors for Ideal Lattices with Applications ⋮ Reproducible Circularly-Secure Bit Encryption: Applications and Realizations ⋮ Lattice-based IBE with equality test supporting flexible authorization in the standard model ⋮ Anonymous IBE, leakage resilience and circular security from new assumptions ⋮ Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem ⋮ Constructions of CCA-Secure Revocable Identity-Based Encryption ⋮ On the security of joint signature and encryption revisited ⋮ On the Impossibility of Strong Encryption Over $\aleph_0$ ⋮ Efficient revocable identity-based encryption with short public parameters ⋮ Key regeneration-free ciphertext-policy attribute-based encryption and its application ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ Bonsai trees, or how to delegate a lattice basis ⋮ Identity-based encryption with hierarchical key-insulation in the standard model ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ Augmented Learning with Errors: The Untapped Potential of the Error Term ⋮ An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem ⋮ Unique-path identity based encryption with applications to strongly secure messaging ⋮ CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts ⋮ Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks ⋮ A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds) ⋮ Reproducible circularly secure bit encryption: applications and realizations ⋮ A lattice-based forward secure IBE scheme for Internet of things ⋮ Practical chosen ciphertext secure encryption from factoring ⋮ Secure integration of asymmetric and symmetric encryption schemes ⋮ Tightly CCA-secure encryption scheme in a multi-user setting with corruptions ⋮ An ID-based cryptographic mechanisms based on GDLP and IFP ⋮ Efficient selective identity-based encryption without random oracles ⋮ Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts ⋮ An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem ⋮ Efficient identity-based encryption with hierarchical key-insulation from HIBE ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ Secure public-key encryption scheme without random oracles ⋮ Efficient public-key encryption with equality test from lattices ⋮ CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN ⋮ New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem ⋮ Robust encryption ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Improved (Hierarchical) Inner-Product Encryption from Lattices ⋮ Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited ⋮ Chosen-Ciphertext Secure Fully Homomorphic Encryption ⋮ Efficient hybrid encryption from ID-based encryption ⋮ Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? ⋮ Generic construction of designated tester public-key encryption with keyword search ⋮ Generalized Identity Based and Broadcast Encryption Schemes ⋮ Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHE ⋮ Generic constructions of integrated PKE and PEKS ⋮ CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Practical Chosen Ciphertext Secure Encryption from Factoring ⋮ CCA-security from adaptive all-but-one lossy trapdoor functions ⋮ One-Time Signatures and Chameleon Hash Functions ⋮ Building Key-Private Public-Key Encryption Schemes ⋮ Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity ⋮ Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN ⋮ Direct chosen-ciphertext secure identity-based key encapsulation without random oracles ⋮ A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems ⋮ Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs ⋮ Robust Encryption ⋮ An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment ⋮ On the Construction of Public Key Encryption with Sender Recovery ⋮ Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE ⋮ Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
This page was built for publication: Chosen‐Ciphertext Security from Identity‐Based Encryption