Building Key-Private Public-Key Encryption Schemes
From MaRDI portal
Recommendations
- scientific article; zbMATH DE number 2081087
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Acquiring key privacy from data privacy
- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
- Anonymous public key encryption under corruptions
Cites work
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 2081087 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in cryptology - CRYPTO '98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23--27, 1998. Proceedings
- Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings.
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Efficient Identity-Based Encryption Without Random Oracles
- Identity-based cryptosystems and signature schemes
- Practical Identity-Based Encryption Without Random Oracles
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Topics in Cryptology – CT-RSA 2005
Cited in
(8)- Non-interactive key exchange: new notions, new constructions, and forward security
- Acquiring key privacy from data privacy
- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
- Anonymous public key encryption under corruptions
- scientific article; zbMATH DE number 5713310 (Why is no real title available?)
- Towards tight adaptive security of non-interactive key exchange
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users
- Orthogonality between Key Privacy and Data Privacy, Revisited
This page was built for publication: Building Key-Private Public-Key Encryption Schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3634499)