The following pages link to (Q4737264):
Displaying 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model (Q514535) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Generic construction of designated tester public-key encryption with keyword search (Q713419) (← links)
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security (Q726365) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions (Q1021236) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Revocable hierarchical identity-based encryption with shorter private keys and update keys (Q1671645) (← links)
- Dual trapdoor identity-based encryption with keyword search (Q1701741) (← links)
- Policy controlled system with anonymity (Q1786597) (← links)
- Bonsai trees, or how to delegate a lattice basis (Q1928766) (← links)
- Relations between semantic security and anonymity in identity-based encryption (Q1944921) (← links)
- Revocable hierarchical identity-based encryption (Q2015131) (← links)
- Revocable hierarchical identity-based encryption with adaptive security (Q2043020) (← links)
- Fine-grained secure attribute-based encryption (Q2139633) (← links)
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications (Q2147256) (← links)
- Generic constructions for fully secure revocable attribute-based encryption (Q2167729) (← links)
- Trapdoor delegation and HIBE from middle-product LWE in standard model (Q2229268) (← links)
- Efficient identity-based encryption with hierarchical key-insulation from HIBE (Q2232128) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme (Q2293022) (← links)
- A fully distributed hierarchical attribute-based encryption scheme (Q2310742) (← links)
- Privacy-preserving encryption scheme using DNA parentage test (Q2344762) (← links)
- Efficient revocable identity-based encryption via subset difference methods (Q2402970) (← links)
- Wildcarded identity-based encryption (Q2429713) (← links)
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme (Q2438535) (← links)
- The relation and transformation between hierarchical inner product encryption and spatial encryption (Q2448081) (← links)
- Several security schemes constructed using ECC-based self-certified public key cryptosystems (Q2572699) (← links)
- Extended dual system group and shorter unbounded hierarchical identity based encryption (Q2630713) (← links)
- Unbounded HIBE with tight security (Q2692379) (← links)
- Updatable public key encryption in the standard model (Q2697895) (← links)
- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts (Q2790033) (← links)
- On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models (Q2796117) (← links)
- Verifiable Security of Boneh-Franklin Identity-Based Encryption (Q3092349) (← links)
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting (Q3104695) (← links)
- Compact Hierarchical IBE from Lattices in the Standard Model (Q3297499) (← links)
- SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption (Q3297518) (← links)
- Simplified Revocable Hierarchical Identity-Based Encryption from Lattices (Q3297616) (← links)
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts (Q3408210) (← links)
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks (Q3503870) (← links)
- An Identity-Based Key Agreement Protocol for the Network Layer (Q3540060) (← links)
- Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources (Q3556627) (← links)
- Practical Identity-Based Encryption Without Random Oracles (Q3593111) (← links)
- Multi-Identity Single-Key Decryption without Random Oracles (Q3600348) (← links)
- Generalized Identity Based and Broadcast Encryption Schemes (Q3600391) (← links)
- Identity-Based Online/Offline Encryption (Q3603012) (← links)
- Adaptive-ID Secure Revocable Identity-Based Encryption (Q3623031) (← links)