Pages that link to "Item:Q3593111"
From MaRDI portal
The following pages link to Practical Identity-Based Encryption Without Random Oracles (Q3593111):
Displaying 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles (Q387810) (← links)
- Broadcast encryption based non-interactive key distribution in MANETs (Q389369) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Accountable authority key policy attribute-based encryption (Q439851) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle (Q497143) (← links)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model (Q514535) (← links)
- Chosen ciphertext secure fuzzy identity based encryption without ROM (Q655101) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search (Q690450) (← links)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions (Q744351) (← links)
- IBE with tight security against selective opening and chosen-ciphertext attacks (Q780378) (← links)
- Generic construction for tightly-secure signatures from discrete log (Q820557) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- Fully CCA2 secure identity based broadcast encryption without random oracles (Q987813) (← links)
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model (Q1009100) (← links)
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions (Q1021236) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Memory lower bounds of reductions revisited (Q1648781) (← links)
- Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem (Q1750339) (← links)
- IRIBE: intrusion-resilient identity-based encryption (Q1750529) (← links)
- Robust encryption (Q1753165) (← links)
- Bonsai trees, or how to delegate a lattice basis (Q1928766) (← links)
- Relations between semantic security and anonymity in identity-based encryption (Q1944921) (← links)
- Cryptanalysis of an identity based broadcast encryption scheme without random oracles (Q1944923) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Revocable hierarchical identity-based encryption (Q2015131) (← links)
- Novel generic construction of leakage-resilient PKE scheme with CCA security (Q2035456) (← links)
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance (Q2061937) (← links)
- Identity-based encryption with security against the KGC: a formal model and its instantiations (Q2062134) (← links)
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo (Q2146102) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Access control encryption with efficient verifiable sanitized decryption (Q2200529) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge (Q2214958) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- Efficient hybrid encryption from ID-based encryption (Q2267789) (← links)
- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model (Q2282274) (← links)
- Novel updatable identity-based hash proof system and its applications (Q2283028) (← links)
- Revocable identity-based encryption with server-aided ciphertext evolution (Q2310741) (← links)
- Continuous leakage-resilient identity-based encryption with leakage amplification (Q2324786) (← links)
- Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments (Q2331797) (← links)