Pages that link to "Item:Q3408210"
From MaRDI portal
The following pages link to New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts (Q3408210):
Displaying 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Lattice-based linearly homomorphic signatures in the standard model (Q284579) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Fully secure revocable attribute-based encryption (Q407453) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Unbounded ABE via bilinear entropy expansion, revisited (Q1648812) (← links)
- Revocable hierarchical identity-based encryption with shorter private keys and update keys (Q1671645) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- Dual trapdoor identity-based encryption with keyword search (Q1701741) (← links)
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing (Q1701978) (← links)
- Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing (Q1703692) (← links)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem (Q1750339) (← links)
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis (Q1787193) (← links)
- Relations between semantic security and anonymity in identity-based encryption (Q1944921) (← links)
- Flexible attribute-based proxy re-encryption for efficient data sharing (Q1999111) (← links)
- Predicate signatures from pair encodings via dual system proof technique (Q2009416) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Revocable hierarchical identity-based encryption (Q2015131) (← links)
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption (Q2035455) (← links)
- Novel generic construction of leakage-resilient PKE scheme with CCA security (Q2035456) (← links)
- Revocable hierarchical identity-based encryption with adaptive security (Q2043020) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Adaptively secure ABE for DFA from \(k\)-Lin and more (Q2055655) (← links)
- Fully secure ABE with outsourced decryption against chosen ciphertext attack (Q2057133) (← links)
- Generic negation of pair encodings (Q2061950) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- Leakage-resilient key exchange and two-seed extractors (Q2096493) (← links)
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE (Q2096618) (← links)
- Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin (Q2139632) (← links)
- Fine-grained secure attribute-based encryption (Q2139633) (← links)
- Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure (Q2148758) (← links)
- CCA-secure ABE using tag and pair encoding (Q2152061) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Rerandomizable signatures under standard assumption (Q2179379) (← links)
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin (Q2188962) (← links)
- Key-policy attribute-based encryption against continual auxiliary input leakage (Q2200658) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Hierarchical attribute based encryption with continuous leakage-resilience (Q2213099) (← links)
- Efficient identity-based encryption with hierarchical key-insulation from HIBE (Q2232128) (← links)
- Fast, compact, and expressive attribute-based encryption (Q2234469) (← links)
- Doubly spatial encryption from DBDH (Q2250446) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)